Showing 21 - 40 results of 69 for search '(optical OR optimal) encryption and authentication', query time: 0.15s Refine Results
  1. 21

    Network Efficient Hierarchical Authentication Algorithm for Secure Communication in IoT and IoE by Abhiram Sharma, R. Suganya, P. B. Krishna, Rudra Raj, Raja Kumar Murugesan

    Published 2024-01-01
    “…By dividing data into 42-bit blocks, it optimizes the encryption process, offering faster, more efficient data protection than conventional approaches. …”
    Get full text
    Article
  2. 22

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  3. 23

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  4. 24

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the identity authentication stage, based on the residual Hash lemma and the signcryptic property, the message was signed and encrypted in one logical step at the same time, and the interaction flow of dot multiplication and Hash operation with low frequency was proposed to complete the access authentication performed by the group leader on behalf of the group members. …”
    Get full text
    Article
  5. 25

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the identity authentication stage, based on the residual Hash lemma and the signcryptic property, the message was signed and encrypted in one logical step at the same time, and the interaction flow of dot multiplication and Hash operation with low frequency was proposed to complete the access authentication performed by the group leader on behalf of the group members. …”
    Get full text
    Article
  6. 26

    A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash by Umar Mujahid, M. Najam-ul-Islam, Atif Raza Jafri, Qurat-ul-Ain, M. Ali Shami

    Published 2016-02-01
    “…Since the RFID uses wireless channel for communication with its associated devices, there should be some optimal encryption methods to secure the communicating data from adversaries. …”
    Get full text
    Article
  7. 27

    Integrating advanced neural network architectures with privacy enhanced encryption for secure and intelligent healthcare analytics by C. Ramesh Babu Durai, S. Dhanasekaran, M. Jamuna Rani, Sindhu Chandra Sekharan

    Published 2025-08-01
    “…“NeuroShield” includes characteristic-based access control (ABAC), Advanced Encryption Standard (AES), Multi-Factor Authentication (MFA) and differential privacy-based optimizations that provide strong protection. …”
    Get full text
    Article
  8. 28

    An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine by Yishan Wu, Mengxue Pang, Jianqiang Ma, Wei Ou, Qiuling Yue, Wenbao Han

    Published 2025-03-01
    “…Its authentication combines iris recognition for secure biometric verification, smart cards for encrypted credential storage, and static passwords for supplementary verification, addressing scenarios like facial coverage in medical settings. …”
    Get full text
    Article
  9. 29

    SSX-EHRs: secure and scalable cross-domain EHRs sharing with blockchain sharding and dynamic proxy re-encryption by Krittin Thirasak, Danupat Chainarong, Teerawat Chuaphanngam, Somchart Fugkeaw

    Published 2025-04-01
    “…This architecture supports dynamic updates through a Merkle tree structure, enabling the addition of new EHRs without the need to rebuild the entire dataset, while ensuring data integrity through fast Merkle proofs. To enhance user authentication, we incorporate self-sovereign identity (SSI) with an improved zk-SNARKs protocol, which leverages a universal setup to minimize communication costs and optimize authentication for cross-domain environments. …”
    Get full text
    Article
  10. 30
  11. 31

    SSL-XIoMT: Secure, Scalable, and Lightweight Cross-Domain IoMT Sharing With SSI and ZKP Authentication by Lyhour Hak, Somchart Fugkeaw

    Published 2025-01-01
    “…To address these limitations, we introduce SSL-XIoMT, an optimized SSI and ZKP authentication framework within a consortium Hyperledger-based environment. …”
    Get full text
    Article
  12. 32

    Using TLA+/TLC for modeling and verification of cryptographic protocols by Maxim V. Neyzov, Egor V. Kuzmin

    Published 2024-12-01
    “…The second technique is related to representing transmitted messages as a hierarchical structure, allowing encrypted messages to be nested within others. The third technique consists of optimizing the model to improve the performance of the TLC model checker by defining a function that generates only those elements leading to transitions between states in the model. …”
    Get full text
    Article
  13. 33

    SC-Route: A Scalable Cross-Layer Secure Routing Method for Multi-Hop Inter-Domain Wireless Networks by Yanbing Li, Yang Zhu, Shangpeng Wang

    Published 2025-05-01
    “…Despite the advances in secure routing techniques in areas such as node authentication and encryption, they still suffer from the shortcomings of frequent key updates, high computational overhead, and poor adaptability to large-scale dynamic topologies. …”
    Get full text
    Article
  14. 34

    Securing Multiple Information Using Bio-Chaotic Keys by Gaurav Verma, Wenqi He, Dajiang Lu, Meihua Liao, Xiang Peng, John Healy, John Sheridan

    Published 2021-01-01
    “…The encryption and decryption processes keep the user-specificity and perform better in reducing space for key storage and transmission. …”
    Get full text
    Article
  15. 35

    Development of biometric systems for passenger identification based on noise-resistant coding means by A. A. Gladkikh, A. K. Volkov, T. G. Ulasyuk

    Published 2021-04-01
    “…The versions to adopt the biometric passenger authentication procedures are under consideration. The conclusion is drawn that with the centralized biometric databases the issues of confidentiality and information security exist. …”
    Get full text
    Article
  16. 36

    CareNexus: Integrated solutions for Healthcare Communication by Alexandru Ioan BULZAN

    Published 2025-05-01
    “…The platform stands out by implementing health risk prediction (HRP) models, advanced authentication and Big Data analytics. A secure authentication based on multiple factors and the use of encryption algorithms, an interface based on different user roles and a prediction system based on model training had been implemented. …”
    Get full text
    Article
  17. 37
  18. 38

    CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES by Petro Klimushyn, Tetiana Solianyk, Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, Vitaliy Svitlychny

    Published 2022-06-01
    “…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
    Get full text
    Article
  19. 39

    A secure end-to-end communication framework for cooperative IoT networks using hybrid blockchain system by Suresh Babu Erukala, Dimitar Tokmakov, Anoosha Perumalla, Rajesh Kaluri, Anna Bekyarova-Tokmakova, Nevena Mileva, Slavi Lubomirov

    Published 2025-04-01
    “…Additionally, aggregating multiple signatures from different authentication events reduces signing time by 1.98 ms compared to the individual signature time of 2.72 ms and the overhead of verifying multiple individual transactions is 2.87 ms is significantly reduced to1.46 ms along with authentication delay ranges between 95–180 ms. …”
    Get full text
    Article
  20. 40

    All-dielectric coding metasurface designs for spin-selective beam shaping and multichannel optical vortex beam manipulation by Naeem Ullah, Ata Ur Rahman Khalid, Shahid Iqbal, Muhammad Imran, Muhammad Ismail Khan, Vijay Laxmi, Yibin Tian, Xiaoqing Tian

    Published 2025-06-01
    “…Enhancing the information-carrying capacity of incident light using multifunctional metasurfaces have attracted considerable interests due to its promising applications in high-secure information encryption and communication. Incorporating spin-dependent wavefront control into all-dielectric designs is particularly important, as it not only allows information encoding based on the polarization state of light but also significantly enhances the channel capacity and security of optical communications. …”
    Get full text
    Article