Results 1 to 10 of about 459,845 (362)

F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption [PDF]

open access: yesMicro, 2021
Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure offloading of computation to untrusted servers. Though it provides ideal security, FHE is expensive when executed in software, 4 to 5 orders of magnitude slower than ...
Axel S. Feldmann   +8 more
semanticscholar   +1 more source

A Modification on Key Stream Generator for RC4 Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2020
Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason RC4 Cipher is vulnerable to a number of attacks.
Suhad Kareem, Abdul Monem Rahma
doaj   +1 more source

Chaos-Based Image Encryption: Review, Application, and Challenges

open access: yesMathematics, 2023
Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric
Bowen Zhang, Lingfeng Liu
semanticscholar   +1 more source

Color Image Encryption Through Chaos and KAA Map

open access: yesIEEE Access, 2023
The unprecedented growth in production and exchange of multimedia over unsecured channels is overwhelming mathematicians, scientists and engineers to realize secure and efficient cryptographic algorithms. In this paper, a color image encryption algorithm
Wassim Alexan   +4 more
semanticscholar   +1 more source

A Novel Data Encryption Algorithm To Ensure Database Security

open access: yesActa Infologica, 2023
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim   +4 more
doaj   +1 more source

Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding

open access: yesMathematics, 2023
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map.
Shenli Zhu   +3 more
semanticscholar   +1 more source

The Use of Template Miners and Encryption in Log Message Compression

open access: yesComputers, 2021
Presently, almost every computer software produces many log messages based on events and activities during the usage of the software. These files contain valuable runtime information that can be used in a variety of applications such as anomaly detection,
Péter Marjai   +2 more
doaj   +1 more source

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

open access: yesJournal of Cryptology, 2021
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide the specification of Ascon-128 and Ascon-128a.
Christoph Dobraunig   +3 more
semanticscholar   +1 more source

Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning

open access: yesFuture Internet, 2021
Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated ...
H. Fang, Q. Qian
semanticscholar   +1 more source

Applications of attack mitigation mechanisms in energy networks, attack detection and preventive methods for security in the smart grid [PDF]

open access: yesE3S Web of Conferences
The Smart Grid promotes energy and environmental sustainability through the integration of vast distributed energy resources. The implementation of such a green system has huge economic and social benefits.
Simeonidis Dimitrios
doaj   +1 more source

Home - About - Disclaimer - Privacy