-
241
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01“…For the confusion module, the scheme initially generates <inline-formula> <tex-math notation="LaTeX">$\mathrm {5\times 5}$ </tex-math></inline-formula> bijective S-boxes, which have never been applied in the present literature with good cryptographic properties. The generated S-box is then used parallel in the substitution module, which provides optimum confusion in the cipher data. …”
Get full text
Article -
242
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01“…A message handler was designed to maintain protocol interaction context information and perform cryptographic operations, thereby supporting testing of the IKE protocol under black-box conditions. …”
Get full text
Article -
243
Physically non-cloneable arbiter-type function with non-linear path pairs
Published 2023-08-01“…Physically unclonable functions (PUFs) are basic physical cryptographical primitives, providing to solve tasks such as unclonable identification, digital device authentication and copyright authentication, true random sequence generation, etc. …”
Get full text
Article -
244
Enterprise internal audit data encryption based on blockchain technology.
Published 2025-01-01“…The research proposed a framework called "BlockCryptoAudit" to enhance internal audit processes through cryptographic encryption methods and blockchain technology, ensuring secure and transparent audit operations. …”
Get full text
Article -
245
A SYNTHESIS METHOD OF BASIC TERNARY BENT-SQUARES BASED ON THE TRIAD SHIFT OPERATOR
Published 2017-05-01“…The paper results are valuable for practical use: the development of new constant amplitude codes for MC-CDMA technology, cryptographic primitives, data compression algorithms, signal structures, algorithms of block and stream encryption, based on advanced principles of many-valued logic. …”
Get full text
Article -
246
High speed national secret SM4 optical fiber communication system scheme based on FPGA
Published 2023-12-01“…With the increasing use of optical fiber communication technology in the Industrial Internet of Things, cryptographic algorithms play a crucial role in ensuring the security of data transmission in embedded device environments.The SM4 packet cipher algorithm, developed independently in our country, is widely applied to wireless LAN and Internet of Things data encryption.However, the software-based encryption and decryption processes are relatively slow, which hampers their application in scenarios requiring high real-time performance, especially for embedded devices.To address this issue, a high-performance and secure optical fiber communication system was designed based on the FPGA platform and the SM4 algorithm.The FPGA was used to implement the MAC layer interface for SM4 algorithm encryption and decryption, as well as data transmission.Besides, an optimization scheme for the hardware implementation architecture of the SM4 algorithm was proposed.The critical path was shortened by employing a pipeline method, thereby improving the system clock frequency.Additionally, parallel processing of S-box transformation was accelerated to enable efficient data replacement.To reduce data reading delays, a dual-cache processing method was combined to facilitate easier processing of cache data and significantly reduce packet loss rates.This scheme greatly enhanced system data throughput.Experimental results demonstrate that compared to similar designs, the throughput of the SM4 algorithm encryption and decryption module in this scheme reaches up to 25.6 Gbit/s, with minimal differences in resource consumption.Due to limitations imposed by the 10-gigabit SFP+ optical module, the throughput of the entire optical fiber communication system reaches 9.4 Gbit/s.For 128-bit data, the average encryption speed is 0.47 μs/bit and the average decryption speed is 0.28 μs/bit, which can be applied to a variety of secure communication scenarios in the internet of things.…”
Get full text
Article -
247
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. …”
Get full text
Article -
248
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01“…Therefore, the traditional cryptographic schemes cannot be used to process cloud’s data. …”
Get full text
Article -
249
Saber With Hybrid Striding Toom Cook-Based Multiplier: Implementation Using Open-Source Tool Flow and Industry Standard Chip Design Tools
Published 2025-01-01“…The Saber is a lattice-based post-quantum cryptographic or quantum-safe algorithm designed as a quantum computing attack-resistant protocol. …”
Get full text
Article -
250
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Published 2024-05-01“…This study delves into the prevalent cryptographic methods and algorithms utilized for prevention and stream encryption, examining their encoding techniques such as advanced encryption standard (AES), Blowfish, Twofish, Salsa20, and ChaCha20. …”
Get full text
Article -
251
Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies
Published 2025-01-01“…In addition, this study addresses vulnerabilities in lightweight AES cryptographic hardware to side-channel attacks (SCA), specifically focusing on Differential Fault Analysis (DFA). …”
Get full text
Article -
252
Effective Partitioning Method With Predictable Hardness for CircuitSAT
Published 2025-01-01“…We demonstrate the effectiveness of the proposed constructions by applying them to some problems associated with CircuitSAT, in particular, Logical Equivalence Checking benchmarks, Automated Test Pattern Generation benchmarks and the inversion problems of some cryptographic functions.…”
Get full text
Article -
253
Cross-Chain Identity Authentication Method Based on Relay Chain
Published 2025-01-01“…For example, there is a concern regarding the protection of identity information during the cross-chain authentication process, and the incompatibility of cryptographic components across different blockchains during cross-chain transactions. …”
Get full text
Article -
254
Cayley–Purser secured communication and jackknife correlative classification for COVID patient data analysis
Published 2025-02-01“…In order to solve these issues, Cayley–Purser Cryptographic Secured Communication based Jackknife Correlative Data Classification (CPCSC-JCDC) method is designed. …”
Get full text
Article -
255
Linking The Cancer Imaging Archive and GenBank to the National Clinical Cohort Collaborative
Published 2025-01-01“…We developed a process to link imaging and genomic variants and N3C EHR data through Privacy Preserving Record Linkage (PPRL) using de‐identified cryptographic hashes to match records associated with the same individuals without using patient identifiers. …”
Get full text
Article -
256
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01“…The integration of BC and SDN supports continuous authentication and monitoring using cryptographic protocols (SHA-256A and RSA-2048) to secure data transmission. …”
Get full text
Article -
257
End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
Published 2025-01-01“…In our paper, we proposed some lightweight cryptographic schemes, and Data management overhead which could fit any device. …”
Get full text
Article -
258
STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES
Published 2024-12-01“…Exploring quantum error-correction codes and post-quantum cryptographic protocols represents a vital area for future research. …”
Get full text
Article -
259
Optimizing FPGA Resource Allocation for SHA-3 Using DSP48 and Pipelining Techniques
Published 2025-01-01“…The system's highest frequency is 107.979 MHz, achieving different throughputs for cryptographic hash functions. Specifically, it performs a throughput of 5.183 Gbps for SHA3-224, 4.895 Gbps for SHA3-256, 3.743 Gbps for SHA3-384, and 2.591 Gbps for SHA3-512. …”
Get full text
Article -
260
ILN-YOLOv8: A Lightweight Image Recognition Model for Crimped Wire Connectors
Published 2025-01-01“…Additionally, the Efficient Local Attention(ELA) attention mechanism is introduced into the Cryptographic Service Provider(CSP) bottleneck with 2 convolutions(C2F) module in the Backbone, improving feature localization accuracy without increasing network complexity. …”
Get full text
Article