Добірка наукової літератури з теми "INVERSION-ENCRYPTION METHOD"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "INVERSION-ENCRYPTION METHOD".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "INVERSION-ENCRYPTION METHOD"

1

Khan, Sajid, Lansheng Han, Ghulam Mudassir, Bachira Guehguih, and Hidayat Ullah. "3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA." Entropy 21, no. 11 (2019): 1075. http://dx.doi.org/10.3390/e21111075.

Повний текст джерела
Анотація:
Color image encryption has enticed a lot of attention in recent years. Many authors proposed a chaotic system-based encryption algorithms for that purpose. However, due to the shortcomings of the low dimensional chaotic systems, similar rule structure for RGB channels, and the small keyspace, many of those were cryptanalyzed by chosen-plaintext or other well-known attacks. A Security vulnerability exists because of the same method being applied over the RGB channels. This paper aims to introduce a new three-channel three rules (3C3R) image encryption algorithm along with two novel mathematical
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Cheng, Peng, and Huai Xun Zhao. "A Novel Image Encryption Algorithm Based on Cellular Automata and Chaotic System." Advanced Materials Research 998-999 (July 2014): 797–801. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.797.

Повний текст джерела
Анотація:
This paper introduces a novel image encryption scheme based on chaotic maps and toggle cellular automata (TCA). In confusion stage, the proposed scheme utilizes logistic map to construct a nonlinear sequence for scrambling the plain-image. Then in diffusion stage, TCA is constructed by setting up the inversion rule and the image which has been processed by chaotic sequence is encryption again by using the TCA iteration method. Theoretical analysis and experimental results demonstrate the proposed algorithm achieves a high security level and processes good performance against common attacks lik
Стилі APA, Harvard, Vancouver, ISO та ін.
3

A., Shanooja M., and Anil Kumar M. N. "A Technique for Image Encryption Using the Modular Multiplicative Inverse Property of Mersenne Primes." Symmetry 17, no. 2 (2025): 166. https://doi.org/10.3390/sym17020166.

Повний текст джерела
Анотація:
Mersenne prime numbers, expressed in the form (2n − 1), have long captivated researchers due to their unique properties. The presented work aims to develop a symmetric cryptographic algorithm using a novel technique based on the logical properties of Mersenne primes. Existing encryption algorithms exhibit certain challenges, such as scalability and design complexity. The proposed novel modular multiplicative inverse property over Mersenne primes simplifies the encryption/decryption process. The simplification is achieved by computing the multiplicative inverse using cyclic bit shift operation.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Lokesh Reddy, B., and Anith Nelleri. "Single-Pixel Compressive Digital Holographic Encryption System Based on Circular Harmonic Key and Parallel Phase Shifting Digital Holography." International Journal of Optics 2022 (July 14, 2022): 1–20. http://dx.doi.org/10.1155/2022/6298010.

Повний текст джерела
Анотація:
An encryption system that combines compressive sensing (CS) and two-step parallel phase shifting digital holography (PPSDH) using double random phase encoding (DRPE) is presented in this paper. The two-step PPSDH is a linear inline holographic scheme and is much suitable for encrypting the 2D/3D information in a single exposure. The distribution of random phase mask (RPM) in the DRPE is implemented using circular harmonic key which increases the security of the encryption process. In this system, the keys used to encrypt are spatial positions of the planes, wavelength, and rotation of the circ
Стилі APA, Harvard, Vancouver, ISO та ін.
5

LI, Huixian, Fulei WANG, Chun SHEN, Shiyuan LIU, and Liaojun PANG. "Small interval interpolation fitting bootstrapping method based on residue number system." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 42, no. 5 (2024): 969–78. https://doi.org/10.1051/jnwpu/20244250969.

Повний текст джерела
Анотація:
Aiming at the problem that the bootstrapping time of approximate homomorphic encryption scheme is too long, a small interval interpolation fitting method based on residue system is proposed. In this paper, the sinusoidal function by using interpolating and fitting method between the multiple cells to avoid the increase in bootstrapping time or decrease in calculation accuracy caused by the high degree of fitting polynomial is calculated. And the efficiency of modular multiplication and modular inversion in the calculation process is improved by combining the residual system. Lagrange interpola
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Liao, Jia, Baihui Jiang, Peng Zhao, Lei Ning, and Liming Chen. "Unmanned Aerial Vehicle-Assisted Federated Learning Method Based on a Trusted Execution Environment." Electronics 12, no. 18 (2023): 3938. http://dx.doi.org/10.3390/electronics12183938.

Повний текст джерела
Анотація:
In the face of increasing concerns around privacy and security in the use of unmanned aerial vehicles (UAVs) for mobile edge computing (MEC), this study proposes a novel approach to secure UAV-assisted federated learning. This research integrates a trusted execution environment (TEE) into UAV-assisted federated learning and proposes a robust aggregation algorithm based on cosine distance, denoted as CosAvg. This study further designs and evaluates a TEE-based federated learning model, comparing its resource overhead with other secure aggregation frameworks, like homomorphic encryption (HE) and
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sun, Zhe, Weiping Li, Junxi Liang, et al. "A Blockchain-Based Fairness Guarantee Approach for Privacy-Preserving Collaborative Training in Computing Force Network." Mathematics 12, no. 5 (2024): 718. http://dx.doi.org/10.3390/math12050718.

Повний текст джерела
Анотація:
The advent of the big data era has brought unprecedented data demands. The integration of computing resources with network resources in the computing force network enables the possibility of distributed collaborative training. However, unencrypted collaborative training is vulnerable to threats such as gradient inversion attacks and model theft. To address this issue, the data in collaborative training are usually protected by cryptographic methods. However, the semantic meaninglessness of encrypted data makes it difficult to prevent potential data poisoning attacks and free-riding attacks. In
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Xi, Yuzhou, Yu Ning, Jie Jin, and Fei Yu. "A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption." Mathematics 12, no. 24 (2024): 3948. https://doi.org/10.3390/math12243948.

Повний текст джерела
Анотація:
Cryptography is one of the most important branches of information security. Cryptography ensures secure communication and data privacy, and it has been increasingly applied in healthcare and related areas. As a significant cryptographic method, the Hill cipher has attracted significant attention from experts and scholars. To enhance the security of the traditional Hill cipher (THC) and expand its application in medical image encryption, a novel dynamic Hill cipher with Arnold scrambling technique (DHCAST) is proposed in this work. Unlike the THC, the proposed DHCAST uses a time-varying matrix
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Naseer, Yasir, Tariq Shah, Dawood Shah, and Sadam Hussain. "A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes." Cryptography 3, no. 1 (2019): 6. http://dx.doi.org/10.3390/cryptography3010006.

Повний текст джерела
Анотація:
The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. However, to create both confusion and diffusion in any cryptosystem p-boxes and chaos base substitution boxes are designed. In this work, a simple method is presented that serves both ways. This method is based on composition of the action of symmetric group on Galois field and inversion map. This construction method provides a large number of highly non-linear substitution permutation boxes having the property of confusion as well as diffusion. These subs
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Li, Jiakun, and Wei Gao. "Hardware Optimization and System Design of Elliptic Curve Encryption Algorithm Based on FPGA." Journal of Sensors 2022 (October 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/9074524.

Повний текст джерела
Анотація:
Since entering the era of big data, the degree of information sharing is getting higher and higher; the information exchange is becoming more and more convenient, but at the same time, personal information is also easy to be exposed to the network environment, if it is used by criminals to lead to information leakage, and then bring certain risks. Therefore, it is in the information age and do a good job of network information security and confidentiality. At present, the security and secrecy of network information are mainly realized by cryptography. Public key cryptography can encrypt inform
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "INVERSION-ENCRYPTION METHOD"

1

RANI, VIJETA. "PSEUDORANDOM BINARY SEQUENCE GENERATION FOR STREAM CIPHERS." Thesis, 2012. http://dspace.dtu.ac.in:8080/jspui/handle/repository/13961.

Повний текст джерела
Анотація:
M.TECH<br>Pseudorandom binary sequences find their application in diverse fields but security and cryptography is probably the best known field of their application. One-Time Pad (OTP) is a simple, fast and the most secure encryption algorithm. It provides the perfect secrecy. The encryptiondecryption process of the OTP is based on exclusive-or function computed on the plaintext/ciphertext and the key bits. The requirements for the OTP key are that: it must be a cryptographically strong truly random or pseudorandom binary sequence; must be as long as plaintext size; and must not be reu
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "INVERSION-ENCRYPTION METHOD"

1

Rane, Jayesh, Ömer Kaya, Suraj Kumar Mallick, and Nitin Liladhar Rane. "Federated learning for edge artificial intelligence: Enhancing security, robustness, privacy, personalization, and blockchain integration in IoT." In Future Research Opportunities for Artificial Intelligence in Industry 4.0 and 5.0. Deep Science Publishing, 2024. http://dx.doi.org/10.70593/978-81-981271-0-5_3.

Повний текст джерела
Анотація:
In order to enable edge artificial intelligence (AI) in Internet of Things (IoT) ecosystems, federated learning (FL) has emerged as a game-changing technique that addresses important issues like data privacy, security, robustness, and personalization. In contrast to conventional AI models that depend on centralized data gathering, FL allows edge devices to work together to jointly learn a shared model while maintaining localized data, greatly improving privacy and lowering transmission overhead. However, there are special difficulties when integrating FL with IoT, including heterogeneity in ed
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!