相关期刊:《International Journal of Communications, Network and System Sciences》《Journal of Information Security》《International Journal of Extreme Manufacturing》《Journal of Harbin Institute of Technology(New Series)》更多>>
This paper deals with the implementation of algorithms and tools for the security of academic data protection in the Democratic Republic of the Congo. It consists principally in implementing two algorithms and two dis...
the Hong Kong Scholar Program (XJ2018035) for their financial support;supported by Research Grants Council of Hong Kong (No. JLFS/E-402/18);National Natural Science Foundation of China (No. 51805509)。
Several natural organism can change shape under external stimuli. These natural phenomena have inspired a vast amount of research on exploration and implementation of reconfigurable shape transformation. The Janus str...
Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size. The present paper includes the study...
With the rapid evolution of data exchange in network environments, information security has been the most important process for data storage and communication. In order to provide such information security, the confid...
In this paper an encryption-decryption algorithm based on two moduli is described: one in the real field of integers and another in the field of complex integers. Also the proper selection of cryptographic system para...
Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorit...
A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the encrypted hologram as well as the decryption key as phase...