-
1
Optical Double Binary Amplitude Mask Structure for Security Authentication
Published 2016-01-01Subjects: “…Optical encryption and authentication…”
Get full text
Article -
2
Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm
Published 2019-01-01Subjects: “…Optical image encryption and authentication…”
Get full text
Article -
3
On the Security of Optical Ciphers Under the Architecture of Compressed Sensing Combining With Double Random Phase Encoding
Published 2017-01-01Subjects: Get full text
Article -
4
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications
Published 2025-05-01Get full text
Article -
5
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01“…Selected as the winner of the National Institute of Standards and Technology (NIST) competition for lightweight encryption algorithms, ASCON ensures confidentiality and integrity through authenticated encryption with associated data (AEAD) tailored for resource-constrained environments. …”
Get full text
Article -
6
Roadmap on Optics and Photonics for Security and Encryption
Published 2025-01-01“…In 1994, Javidi and Horner published a paper in Optical Engineering that highlighted the ability of free space optical systems to manipulate sensitive data for authentication purposes. …”
Get full text
Article -
7
AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme
Published 2025-03-01“… In this paper, we introduce AETHER, an authenticated encryption scheme that achieves ultra-high throughput and low energy consumption, supporting a 256- bit key and a 128-bit tag. …”
Get full text
Article -
8
Improving the Integrity of a Voting Process with Biometric Authentication and Data Encryption
Published 2023-04-01Get full text
Article -
9
Distributed and efficient identity authentication based on consortium blockchain
Published 2022-03-01“…Features and asymmetric encryption methods are used to improve the security and stability of the user identity authentication system. …”
Get full text
Article -
10
Exploiting Optical Chaos for Color Image Encryption and Secure Resource Sharing in Cloud
Published 2019-01-01“…Cloud as a developing technology provides convenient services to sharing and usage of images resource, but brings a threat to images security and privacy authentication. Optical chaos possess distinct superiority for image secure sharing, therefore, based on two mutually coupled semiconductor lasers (MC-SL1 and MC-SL2), we theoretically propose a color image encryption system for secure resource sharing and introduce a watermarking method for images privacy authentication in cloud. …”
Get full text
Article -
11
Optical audio cryptosystem using hyperchaotic implementation in Gyrator domain
Published 2025-05-01“…Indeed, the suggested cryptographic system is apt for authenticating messages, as hyperchaotic data is essential for encryption and decryption techniques. …”
Get full text
Article -
12
Full lifecycle security management scheme for terminal keys under power IoT
Published 2025-01-01“…The performance analysis shows that compared to the traditional access authentication and key management scheme based on logical key hierarchy, the scheme of this paper optimizes the terminal computation, reduces the computational overhead and simplifies the key update process. …”
Get full text
Article -
13
Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework
Published 2025-03-01“…In this paper, we present MLOL, a novel AEAD algorithm based on the LOL framework. MLOL combines authenticated encryption with optimizations to the LFSR structure to enhance both security and efficiency. …”
Get full text
Article -
14
Research on Information Security Transmission of Port Multi-Thread Equipment Based on Advanced Encryption Standard and Preprocessing Optimization
Published 2024-12-01“…On this basis, in order to reduce the cost overhead generated by AES encryption, this paper used the pre-computed method of optimizing S-boxes and Mixcolumn matrices to be applied to the multithreaded control framework, which improved the computation rate of AES, and then it improved the efficiency of the information transmission in the multithreaded control process. …”
Get full text
Article -
15
A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes
Published 2025-06-01“…The modified Al-Biruni earth radius search optimization (MBERSO) algorithm is used to make the best keys for this EC-EC encryption scheme. …”
Get full text
Article -
16
Stochastic Photoresponse‐Driven Perovskite TRNGs for Secure Encryption Systems
Published 2025-04-01Get full text
Article -
17
Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus
Published 2025-05-01“…Each Electronic Control Unit (ECU) node independently performs compression, encryption, and authentication while periodically updating its keys to enhance system security and strengthen defense capabilities. …”
Get full text
Article -
18
A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption
Published 2025-01-01“…Homomorphic encryption (HE) addresses this problem by allowing direct computation on encrypted data without decryption. …”
Get full text
Article -
19
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Published 2024-12-01“…The Tree-based Spider-Net Multipath (TBSNM) methodology is utilized, while an Advanced Encryption Standard (AES) technique is used to authenticate users. …”
Get full text
Article -
20
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01“…Based on the PKC-based RFID authentication protocol cryptoGPS which costs the least resource currently,a low-cost mutual authentication protocol which has a flexible key-management and can realize a mutual authentication was proposed.It adopted a new key-management scheme,an optimized fast Rabin encryption algorithm,low Hamming weight modulus and a lightweight stream cipher algorithm Grain V1,moreover,a new low-cost multiplier was designed to achieve the modulus multiplication on large numbers.The security analysis and simulation experiments carried out on Design Complier with Smic 0.25 μm technique show that this scheme is secure enough and in which the tag just needs 4 530 gates,it is suitable for RFID system.…”
Get full text
Article