Showing 1 - 20 results of 69 for search '(optical OR optimal) encryption and authentication', query time: 0.32s Refine Results
  1. 1

    Optical Double Binary Amplitude Mask Structure for Security Authentication by Xiaogang Wang, Guoquan Zhou, Chaoqing Dai

    Published 2016-01-01
    Subjects: “…Optical encryption and authentication…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices by Gabriela Cagua, Valerie Gauthier-Umana, Carlos Lozano-Garzon

    Published 2025-01-01
    “…Selected as the winner of the National Institute of Standards and Technology (NIST) competition for lightweight encryption algorithms, ASCON ensures confidentiality and integrity through authenticated encryption with associated data (AEAD) tailored for resource-constrained environments. …”
    Get full text
    Article
  6. 6

    Roadmap on Optics and Photonics for Security and Encryption by Bahram Javidi, Artur Carnicer, Kavan Ahmadi, Yasuhiro Awatsuji, Wen Chen, Thierry Fournel, Patrice Genevet, Jingying Guo, Wenqi He, Mathieu Hebert, Aloke Jana, Edmund Y. Lam, Gui-Lu Long, Osamu Matoba, Zhaoke Mi, Inkyu Moon, Naveen K. Nishchal, Dong Pan, Xiang Peng, Pepijn W. H. Pinkse, Yishi Shi, Guohai Situ, Adrian Stern, Xiaogang Wang, Tian Xia, Yin Xiao, Xie Zhenwei, Shuo Zhu

    Published 2025-01-01
    “…In 1994, Javidi and Horner published a paper in Optical Engineering that highlighted the ability of free space optical systems to manipulate sensitive data for authentication purposes. …”
    Get full text
    Article
  7. 7

    AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme by Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Mostafizar Rahman, Kosei Sakamoto

    Published 2025-03-01
    “… In this paper, we introduce AETHER, an authenticated encryption scheme that achieves ultra-high throughput and low energy consumption, supporting a 256- bit key and a 128-bit tag. …”
    Get full text
    Article
  8. 8
  9. 9

    Distributed and efficient identity authentication based on consortium blockchain by Yao Ying, Yan Yong, Guo Shaoyong, Xiong Ao, Zhang Wang

    Published 2022-03-01
    “…Features and asymmetric encryption methods are used to improve the security and stability of the user identity authentication system. …”
    Get full text
    Article
  10. 10

    Exploiting Optical Chaos for Color Image Encryption and Secure Resource Sharing in Cloud by Lili Li, Yiyuan Xie, Yuzhu Liu, Bocheng Liu, Yichen Ye, Tingting Song, Yushu Zhang, Yong Liu

    Published 2019-01-01
    “…Cloud as a developing technology provides convenient services to sharing and usage of images resource, but brings a threat to images security and privacy authentication. Optical chaos possess distinct superiority for image secure sharing, therefore, based on two mutually coupled semiconductor lasers (MC-SL1 and MC-SL2), we theoretically propose a color image encryption system for secure resource sharing and introduce a watermarking method for images privacy authentication in cloud. …”
    Get full text
    Article
  11. 11

    Optical audio cryptosystem using hyperchaotic implementation in Gyrator domain by Miao Tian, Yuanyue Cui, Zhengjun Liu, Hang Chen

    Published 2025-05-01
    “…Indeed, the suggested cryptographic system is apt for authenticating messages, as hyperchaotic data is essential for encryption and decryption techniques. …”
    Get full text
    Article
  12. 12

    Full lifecycle security management scheme for terminal keys under power IoT by Wang Hui, Yuan Jiahui, Shi Zhentong, Fang Mu

    Published 2025-01-01
    “…The performance analysis shows that compared to the traditional access authentication and key management scheme based on logical key hierarchy, the scheme of this paper optimizes the terminal computation, reduces the computational overhead and simplifies the key update process. …”
    Get full text
    Article
  13. 13

    Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework by Xinyue Zhang, Daoguang Mu, Wenzheng Zhang, Xinfeng Dong

    Published 2025-03-01
    “…In this paper, we present MLOL, a novel AEAD algorithm based on the LOL framework. MLOL combines authenticated encryption with optimizations to the LFSR structure to enhance both security and efficiency. …”
    Get full text
    Article
  14. 14

    Research on Information Security Transmission of Port Multi-Thread Equipment Based on Advanced Encryption Standard and Preprocessing Optimization by Zhixin Xia, Xiaolei Yang, Afei Li, Yongshan Liu, Siyuan He

    Published 2024-12-01
    “…On this basis, in order to reduce the cost overhead generated by AES encryption, this paper used the pre-computed method of optimizing S-boxes and Mixcolumn matrices to be applied to the multithreaded control framework, which improved the computation rate of AES, and then it improved the efficiency of the information transmission in the multithreaded control process. …”
    Get full text
    Article
  15. 15

    A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes by Swetha S, Joe Prathap P M

    Published 2025-06-01
    “…The modified Al-Biruni earth radius search optimization (MBERSO) algorithm is used to make the best keys for this EC-EC encryption scheme. …”
    Get full text
    Article
  16. 16
  17. 17

    Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus by Yuanhao Wang, Yinan Xu, Zhiquan Liu, Suya Liu, Yujing Wu

    Published 2025-05-01
    “…Each Electronic Control Unit (ECU) node independently performs compression, encryption, and authentication while periodically updating its keys to enhance system security and strengthen defense capabilities. …”
    Get full text
    Article
  18. 18

    A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption by Linh Nguyen, Quoc Bao Phan, Lan Zhang, Tuy Tan Nguyen

    Published 2025-01-01
    “…Homomorphic encryption (HE) addresses this problem by allowing direct computation on encrypted data without decryption. …”
    Get full text
    Article
  19. 19

    Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments by Faeiz Alserhani

    Published 2024-12-01
    “…The Tree-based Spider-Net Multipath (TBSNM) methodology is utilized, while an Advanced Encryption Standard (AES) technique is used to authenticate users. …”
    Get full text
    Article
  20. 20

    A Low-Cost PKC-Based RFID Mutual Authentication Protocol by Lili Wei, Qingkuan Dong, Wenxiu Ding

    Published 2013-10-01
    “…Based on the PKC-based RFID authentication protocol cryptoGPS which costs the least resource currently,a low-cost mutual authentication protocol which has a flexible key-management and can realize a mutual authentication was proposed.It adopted a new key-management scheme,an optimized fast Rabin encryption algorithm,low Hamming weight modulus and a lightweight stream cipher algorithm Grain V1,moreover,a new low-cost multiplier was designed to achieve the modulus multiplication on large numbers.The security analysis and simulation experiments carried out on Design Complier with Smic 0.25 μm technique show that this scheme is secure enough and in which the tag just needs 4 530 gates,it is suitable for RFID system.…”
    Get full text
    Article