CIPHER

作品数:103被引量:75H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张汇杨小帅蔡鑫李春葆陈良臣更多>>
相关机构:武汉邮电科学研究院华北电力大学中兴软件技术(南昌)有限公司武汉大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划中国博士后科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
A Wrapping Encryption Based on Double Randomness Mechanism
《Computers, Materials & Continua》2023年第10期1143-1164,共22页Yi-Li Huang Fang-Yie Leu Ruey-Kai Sheu Jung-Chun Liu Chi-Jan Huang 
supported in part by Ministry of Science and Technology(MOST),Taiwan under the Grant MOST 109-2221-E-029-017-MY2.
Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite commun...
关键词:Initial encryption key accumulated shifting substitution three-dimensional operation wrapped ciphertext file 
Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution
《The Journal of China Universities of Posts and Telecommunications》2023年第5期51-60,共10页Meng Hui Ren Lina Zhao Zongqu 
supported by the Henan Key Laboratory of Network Cryptography Technology(LNCT2022-A11);the Shaanxi Key Laboratory of Information Communication Network and Security(ICNS202006)。
Proxy re-encryption(PRE)allows users to transfer decryption rights to the data requester via proxy.Due to the current PRE schemes from lattice(LPRE)cannot fulfill chosen-ciphertext attack(CCA)security,an identity-base...
关键词:proxy re-encryption(PRE) learning with errors over ring(RLWE) chosen-ciphertext attack(CCA) ciphertext delegation ciphertext evolution 
RBFK cipher:a randomized butterfly architecture‑based lightweight block cipher for IoT devices in the edge computing environment
《Cybersecurity》2023年第3期18-36,共19页Sohel Rana M.Rubaiyat Hossain Mondal Joarder Kamruzzaman 
Internet security has become a major concern with the growing use of the Internet of Things(IoT)and edge computing technologies.Even though data processing is handled by the edge server,sensitive data is generated and...
关键词:Avalanche effects Block ciphers Butterfly architecture Edge computing FELICS IOT Lightweight cryptosystems MATLAB 
Universal tweakable Even-Mansour cipher and its applications
《Frontiers of Computer Science》2023年第4期181-192,共12页Ping ZHANG 
supported by the National Key Research and Development Program of China(2019YFB2101704);National Natural Science Foundation of China(Grant Nos.61902195 and 62102196);NUPTSF(NY219131).
The construction of the tweakable Even-Mansour cipher is in fact the designs of permutations,mask operations,and masking functions.For information-theoretic security,permutations are usually taken as random permutatio...
关键词:tweakable Even-Mansour cipher masking function multi-key security H-coefficients technique ENCRYPTION authenticated encryption 
Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud
《Computers, Materials & Continua》2023年第7期939-956,共18页Zaid Abdulsalam Ibrahim Muhammad Ilyas 
Most research works nowadays deal with real-time Internetof Things (IoT) data. However, with exponential data volume increases,organizations need help storing such humongous amounts of IoT data incloud storage systems...
关键词:Bilinear Diffie-Hellman(DBDH) Internet of Things(IoT) Ciphertext-Policy Attribute-Based Encryption(CP-ABE) Hidden Hierarchy CP-ABE(HH-CP-ABE) 
An Improved Pairing-Free Ciphertext Policy Framework for IoT
《Computer Systems Science & Engineering》2023年第6期3079-3095,共17页M.Amirthavalli S.Chithra R.Yugha 
Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confident...
关键词:Internet of things access control cipher policy based-attribute based encryption(CP-ABE) access matrix performance analysis 
An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher
《Computers, Materials & Continua》2023年第5期2641-2654,共14页Ghofran Kh.Shraida Hameed A.Younis Taief Alaa Al-Amiedy Mohammed Anbar Hussain A.Younis Iznan H.Hasbullah 
This research is funded by Universiti SainsMalaysia(USM)via an external Grant Number(304/PNAV/650958/U154).
Nowadays,high-resolution images pose several challenges in the context of image encryption.The encryption of huge images’file sizes requires high computational resources.Traditional encryption techniques like,Data En...
关键词:Color image encryption DNA encoding lorenz system rossler system SHA-2 
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
《Computers, Materials & Continua》2023年第5期3065-3089,共25页Ali Arshad Muhammad Nadeem Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 
This research was supported by the Researchers supporting program(TUMAProject-2021-27)Almaarefa University,Riyadh,Saudi Arabia.
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog...
关键词:CRYPTOGRAPHY symmetric cipher text ENCRYPTION matrix cipher encoding decoding hill matrix 64-bit encryption 
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
《Computers, Materials & Continua》2023年第2期4059-4079,共21页Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 
the Researchers Supporting Program(TUMAProject-2021-27)Almaarefa University,Riyadh,Saudi Arabia.
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve...
关键词:Symmetric CRYPTOGRAPHY CIPHERTEXT encryption DECRYPTION cloud security matrix cipher 
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing被引量:1
《Chinese Physics B》2023年第2期136-149,共14页王兴元 王哓丽 滕琳 蒋东华 咸永锦 
supported by the National Natural Science Foundation of China (Grant No. 61672124);the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203);Liaoning Province Science and Technology Innovation Leading Talents Program Project (Grant No. XLYC1802013);Key R&D Projects of Liaoning Province (Grant No. 2019020105JH2/103);Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (Grant No. 2019GXRC031);Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (Grant No. MIMS20-M-02)。
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F...
关键词:chaotic image encryption compressive sensing meaningful cipher image portable network graphics image encryption algorithm 
检索报告 对象比较 聚类工具 使用帮助 返回顶部