期刊文献+
共找到2,222篇文章
< 1 2 112 >
每页显示 20 50 100
Enhancing Underwater Optical Wireless Communication with a High Efficiency Image Encryption System
1
作者 Somia A.Abd El-Mottaleb Amira G.Mohamed +4 位作者 Mehtab Singh Hassan Yousif Ahmed Medien Zeghid Abu Sufian A.Osman Sami Mourou 《Computers, Materials & Continua》 2026年第5期1324-1354,共31页
This paper presents an image encryption scheme for underwater optical wireless communication(UOWC)systems based on dynamically generated hyperchaotic S-boxes,aiming to enhance both data security and transmission perfo... This paper presents an image encryption scheme for underwater optical wireless communication(UOWC)systems based on dynamically generated hyperchaotic S-boxes,aiming to enhance both data security and transmission performance in underwater environments.The proposed encryption approach provides strong confusion and diffusion properties and is evaluated over five Jerlov water types with different optical attenuation characteristics.Security analysis demonstrates that the encrypted images achieve information entropy values close to the ideal value of 8(7.9925–7.9993),with very low correlation coefficients in horizontal,vertical,and diagonal directions,as well as the system achieves high values in key metrics such as the Unified Average Changing Intensity(UACI)and Number of Pixel Change Rate(NPCR),ranging from 33.42 to 33.47 and from 99.58%to 99.62%,respectively,both near their theoretical optima.In addition to improving confidentiality,the hyperchaotic encryption process decorrelates pixel intensities and redistributes image spectral content,which enhances robustness against underwater absorption and scattering effects.As a result,improved transmission performance is observed;for example,in Jerlov type I(JI)water,the effective transmission distance is extended from16mfor plain images to 24mfor encrypted images,while the Peak Signal to Noise Ratio(PSNR)at 24 m increases from 9.25 to 20.13 dB after decryption and enhancement.These results confirmthat the proposed scheme provides a dual benefit of secure and reliable image transmission in UOWC systems. 展开更多
关键词 Underwater optical wireless communication S-boxes hyperchaotic maps encryption algorithm information entropy Jerlov water structure similarity index peak signal-to-noise-ratio
在线阅读 下载PDF
An Image Encryption Algorithm Based on BP Neural Network and Hyperchaotic System 被引量:10
2
作者 Feifei Yang Jun Mou +1 位作者 Yinghong Cao Ran Chu 《China Communications》 SCIE CSCD 2020年第5期21-28,共8页
To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryption algorithm based... To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryption algorithm based on fractional-order memristive hyperchaotic system and BP neural network is proposed. In this algorithm, the image pixel values are compressed by BP neural network, the chaotic sequences of the fractional-order memristive hyperchaotic system are used to diffuse the pixel values. The experimental simulation results indicate that the proposed algorithm not only can effectively compress and encrypt image, but also have better security features. Therefore, this work provides theoretical guidance and experimental basis for the safe transmission and storage of image information in practical communication. 展开更多
关键词 BP neural network fractional-order hyperchaotic system image encryption algorithm secure communication
在线阅读 下载PDF
A realizable quantum encryption algorithm for qubits 被引量:5
3
作者 周南润 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第11期2164-2169,共6页
A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext spa... A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext space expanded greatly. The security of the proposed algorithm is analysed in detail and the schematic physical implementation is also provided. It is shown that the algorithm, which can prevent quantum attack strategy as well as classical attack strategy, is effective to protect qubits. Finally, we extend our algorithm to encrypt classical binary bits and quantum entanglements. 展开更多
关键词 quantum encryption algorithm quantum computation CRYPTOGRAPHY
原文传递
An Analysis of International Data Encryption Algorithm(IDEA) Security against Differential Cryptanalysis 被引量:3
4
作者 CHEN Jia XUE Dongyue LAI Xuejia 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期697-701,共5页
The security of international date encryption algorithm (IDEA(16)), a mini IDEA cipher, against differential cryptanalysis is investigated. The results show that [DEA(16) is secure against differential cryptanal... The security of international date encryption algorithm (IDEA(16)), a mini IDEA cipher, against differential cryptanalysis is investigated. The results show that [DEA(16) is secure against differential cryptanalysis attack after 5 rounds while IDEA(8) needs 7 rounds for the same level of security. The transition matrix for IDEA(16) and its eigenvalue of second largest magnitude are computed. The storage method for the transition matrix has been optimized to speed up file I/O. The emphasis of the work lies in finding out an effective way of computing the eigenvalue of the matrix. To lower time complexity, three mature algorithms in finding eigenvalues are compared from one another and subspace iteration algorithm is employed to compute the eigenvalue of second largest module, with a precision of 0.001. 展开更多
关键词 international date encryption algorithm(IDEA) cipher differential cryptanalysis Markov cipher transition matrix subspace iteration
原文传递
A self-cited pixel summation based image encryption algorithm 被引量:1
5
作者 Guo-Dong Ye Xiao-Ling Huang +1 位作者 Leo Yu Zhang Zheng-Xia Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第1期131-138,共8页
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make ... In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security. 展开更多
关键词 pixel summation image encryption algorithm intertwining logistic map GRAVITY SECURITY
原文传递
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing 被引量:1
6
作者 王兴元 王哓丽 +2 位作者 滕琳 蒋东华 咸永锦 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期136-149,共14页
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. First, a dynamic spiral block scrambling is designed to encrypt the sparse matrix generated by performing discrete wavelet transform(DWT)on the plain image. Then, the encrypted image is compressed and quantified to obtain the noise-like cipher image. Then the cipher image is embedded into the alpha channel of the carrier image in portable network graphics(PNG) format to generate the visually meaningful steganographic image. In our scheme, the hyperchaotic Lorenz system controlled by the hash value of plain image is utilized to construct the scrambling matrix, the measurement matrix and the embedding matrix to achieve higher security. In addition, compared with other existing encryption algorithms, the proposed PNG-based embedding method can blindly extract the cipher image, thus effectively reducing the transmission cost and storage space. Finally, the experimental results indicate that the proposed encryption algorithm has very high visual security. 展开更多
关键词 chaotic image encryption compressive sensing meaningful cipher image portable network graphics image encryption algorithm
原文传递
An image joint compression-encryption algorithm based on adaptive arithmetic coding
7
作者 邓家先 邓海涛 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第9期403-408,共6页
Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process o... Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process of image compression are modified by keys in order to achieve image joint compression encryption. Combined with the bit-plane coding technique, the discrete wavelet transform coefficients in different resolutions can be encrypted respectively with different keys, so that the resolution selective encryption is realized to meet different application needs. Zero-tree coding is improved, and adaptive arithmetic coding is introduced. Then, the proposed joint compression-encryption algorithm is simulated. The simulation results show that as long as the parameters are selected appropriately, the compression efficiency of proposed image joint compression-encryption algorithm is basically identical to that of the original image compression algorithm, and the security of the proposed algorithm is better than the joint encryption algorithm based on interval splitting. 展开更多
关键词 image compression joint compression-encryption algorithm arithmetic encryption progressiveclassification encryption
原文传递
Enhancement of Video Encryption Algorithm Performance Using Finite Field Z2^3-Based Chaotic Cipher
8
作者 M. T. Suryadi B. Budiardjo K. Ramli 《通讯和计算机(中英文版)》 2012年第8期960-964,共5页
关键词 混沌密码 有限域 加密算法 性能 视频 已知明文攻击 加密过程 密码学
在线阅读 下载PDF
Algebraic Cryptanalysis of GOST Encryption Algorithm
9
作者 Ludmila Babenko Ekaterina Maro 《Journal of Computer and Communications》 2014年第4期10-17,共8页
This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic an... This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define relations between a secret key and a cipher text. Extended linearization method is evaluated as a method for solving the nonlinear sys- tem of equations. 展开更多
关键词 encryption algorithm GOST GOST S-BOX Systems of MULTIVARIATE QUADRATIC Equations ALGEBRAIC CRYPTANALYSIS Extended LINEARIZATION Method Gaussian Elimination
在线阅读 下载PDF
Logical mistakes in NTRU compensation algorithm and improvement of encryption verification algorithm
10
作者 QUAN Yi-ning LI Xin-she HU Yu-pu 《通讯和计算机(中英文版)》 2008年第6期35-41,共7页
关键词 逻辑错误 计算方法 解码 信息技术
在线阅读 下载PDF
An algorithm of file encryption based on sum function sequences
11
作者 ZHOU Lei LU Hai-lian +1 位作者 SUN Yu-qiang GU Yu-wan 《通讯和计算机(中英文版)》 2008年第1期48-52,共5页
关键词 和函数序列 编码算法 信息安全 加密
在线阅读 下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
12
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos algorithm Image encryption and Decryption Two-Stage Logistic Mapping M Sequence
在线阅读 下载PDF
Analysis and Design for Unsymmetrical Block Encryption Algorithm
13
作者 王以刚 孔令飞 《Journal of China Textile University(English Edition)》 EI CAS 1999年第2期50-52,共3页
This article explains the imbalance in DES and introduces the operators in IDEA. At last it puts forward a Unsym-metrical Block Encryption Algorithm which is achieved by adding some operators to DES.
关键词 BLACK CIPHER CIPHER algorithm DES IDEA UNSYMMETRICAL block encryptION
在线阅读 下载PDF
Quantum color image encryption: Dual scrambling scheme based on DNA codec and quantum Arnold transform
14
作者 Tao Cheng Run-Sheng Zhao +2 位作者 Shuang Wang Kehan Wang Hong-Yang Ma 《Chinese Physics B》 2025年第1期235-244,共10页
In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quan... In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quantum Arnold transform(QAr T) to propose a new double encryption algorithm for quantum color images to improve the security and robustness of image encryption. First, we utilize the biological characteristics of DNA codecs to perform encoding and decoding operations on pixel color information in quantum color images, and achieve pixel-level diffusion. Second, we use QAr T to scramble the position information of quantum images and use the operated image as the key matrix for quantum XOR operations. All quantum operations in this paper are reversible, so the decryption operation of the ciphertext image can be realized by the reverse operation of the encryption process. We conduct simulation experiments on encryption and decryption using three color images of “Monkey”, “Flower”, and “House”. The experimental results show that the peak value and correlation of the encrypted images on the histogram have good similarity, and the average normalized pixel change rate(NPCR) of RGB three-channel is 99.61%, the average uniform average change intensity(UACI) is 33.41%,and the average information entropy is about 7.9992. In addition, the robustness of the proposed algorithm is verified by the simulation of noise interference in the actual scenario. 展开更多
关键词 DNA codec quantum Arnold transform quantum image encryption algorithm
原文传递
激光通信网络星间链路隐私数据汇聚传输方法
15
作者 周显春 焦萍萍 陈鹤鸣 《激光杂志》 北大核心 2026年第2期191-197,共7页
传统方法对层间链路加密分散数据时,仅依赖单一密钥,会缺乏多层次加密保护,降低了对隐私数据传输的精度。为此,提出激光通信网络星间链路隐私数据汇聚传输方法。采用模糊C均值聚类方法将各卫星链路上的数据汇聚到中心卫星上,引入三维维... 传统方法对层间链路加密分散数据时,仅依赖单一密钥,会缺乏多层次加密保护,降低了对隐私数据传输的精度。为此,提出激光通信网络星间链路隐私数据汇聚传输方法。采用模糊C均值聚类方法将各卫星链路上的数据汇聚到中心卫星上,引入三维维吉尼亚加密算法,通过双重密钥和加密幅值两次加密处理汇聚数据,以增强数据传输的安全性,计算同层星间链路和层间星间链路的距离与夹角,选取权重值最高的星间链路对两次加密后的数据展开安全汇聚传输。实验结果表明,该方法的隐私数据传输到目标卫星中的数据和原始数据之间的相似度超过99.5%,传输精度高于对比方法,而数据传输风险值低于0.25,数据传输风险值一直低于对比方法。 展开更多
关键词 激光通信网络 星间链路 隐私数据汇聚传输 模糊C均值 三维维吉尼亚加密算法
原文传递
基于全同态加密的区块链电子投票方案
16
作者 高改梅 邸国霞 +3 位作者 刘春霞 杨玉丽 党伟超 张爱贞 《计算机工程》 北大核心 2026年第4期313-326,共14页
在数字化投票系统中,全同态加密(FHE)与区块链技术的结合保障了电子投票的安全性和隐私性,但现有方案因FHE算法复杂的计算过程导致系统整体性能较差,尤其是在计票效率和公平性方面,因此提出一种基于FHE的区块链电子投票方案(BCEVS-FHE)... 在数字化投票系统中,全同态加密(FHE)与区块链技术的结合保障了电子投票的安全性和隐私性,但现有方案因FHE算法复杂的计算过程导致系统整体性能较差,尤其是在计票效率和公平性方面,因此提出一种基于FHE的区块链电子投票方案(BCEVS-FHE)。该方案首先通过优化BFV(Brakerski—Fan—Vercauteren)FHE算法中噪声因子的影响,降低加解密过程中的计算开销,从而提高计票效率;然后利用SM2数字签名算法对投票者生成的选票信息进行签名,确保投票者无法否认其投票行为,防止身份信息假冒与欺诈;接着引入智能合约对加权计票的加权方式进行改进,确保投票者权重的不可伪造性和不可篡改性,保障投票过程的公平公正;最后通过私有区块链方式将所有交易信息都存储到链上,确保整个投票过程不可篡改和可追溯。实验结果表明,该方案不仅在隐私性、机密性、安全性、唯一性和可验证性等安全属性上得到了保障,而且在公平性和可移动性等功能属性上表现出色。综合来看,BCEVS-FHE满足电子投票协议的安全需求,还具有较高的实际应用潜力,对于数字化投票系统的广泛应用具有重要的研究价值。 展开更多
关键词 区块链 电子投票 全同态加密 智能合约 签名算法
在线阅读 下载PDF
基于1394仿真卡配置文件的加密设计与实现
17
作者 康磊 李乐乐 《工业控制计算机》 2026年第2期21-22,25,共3页
IEEE-1394总线是一种高性能串行通信协议,在航空、航天和工业控制等领域得到了广泛应用。随着航空航天领域电子设备的快速发展,仿真卡的配置文件面临被非法复制、篡改或逆向工程的风险,进而威胁系统安全性和知识产权保护。为此,提出了... IEEE-1394总线是一种高性能串行通信协议,在航空、航天和工业控制等领域得到了广泛应用。随着航空航天领域电子设备的快速发展,仿真卡的配置文件面临被非法复制、篡改或逆向工程的风险,进而威胁系统安全性和知识产权保护。为此,提出了一种基于加密存储与认证机制的配置文件保护方案。该方案在软件端采用AES对称加密算法对配置文件进行加密存储,并在硬件端通过加密芯片进行完整性验证。最后,在1394仿真卡上进行实验验证,结果表明配置文件的安全性得到了有效保障。 展开更多
关键词 1394总线 配置文件 AES加密算法 加密芯片
在线阅读 下载PDF
Reconfigurable implementation of AES algorithm IP core based on pipeline structure 被引量:6
18
作者 李冰 夏克维 梁文丽 《Journal of Southeast University(English Edition)》 EI CAS 2010年第1期21-25,共5页
In order to improve the data throughput of the advanced encryption standard (AES) IP core while reducing the hardware resource consumption and finally achieving a tradeoff between speed and area, a mixed pipeline ar... In order to improve the data throughput of the advanced encryption standard (AES) IP core while reducing the hardware resource consumption and finally achieving a tradeoff between speed and area, a mixed pipeline architecture and reconfigurable technology for the design and implementation of the AES IP core is proposed. The encryption and decryption processes of the AES algorithm are achieved in the same process within the mixed pipeline structure. According to the finite field characterizations, the Sbox in the AES algorithm is optimized. ShiftRow and MixColumn, which are the main components in AES round transformation, are optimized with the reconfigurable technology. The design is implemented on the Xilinx Virtex2p xc2vp20-7 field programmable gate array (FPGA) device. It can achieve a data throughput above 2.58 Gbit/s, and it only requires 3 233 slices. Compared with other related designs of AES IP cores on the same device, the proposed design can achieve a tradeoff between speed and area, and obtain satisfactory results in both data throughput and hardware resource consumption. 展开更多
关键词 advanced encryption standard (AES) algorithm RECONFIGURABLE PIPELINE finite field round transformation
在线阅读 下载PDF
隐私计算中的高性能加密算法研究
19
作者 姚文龙 毛华彬 傅彦铭 《信息安全研究》 北大核心 2026年第3期274-283,共10页
在数字经济快速发展的背景下,如何在保障数据隐私的前提下高效利用数据成为当前科技发展的核心挑战.隐私计算作为解决“数据可用不可见”问题的关键技术体系逐步走向实际应用.其中,同态加密、零知识证明和安全多方计算作为3大核心加密技... 在数字经济快速发展的背景下,如何在保障数据隐私的前提下高效利用数据成为当前科技发展的核心挑战.隐私计算作为解决“数据可用不可见”问题的关键技术体系逐步走向实际应用.其中,同态加密、零知识证明和安全多方计算作为3大核心加密技术,在理论构建与工程实现方面取得了显著进展,并在高性能计算环境中展现出广泛应用潜力.围绕上述3类高性能加密算法展开系统综述,介绍算法研究进展,并重点从计算效率、通信开销与高性能计算环境适配性3个维度进行分析.结果表明:同态加密适用于无需交互的数据处理任务,具备较强的自治性,但计算与通信开销较高;零知识证明在验证效率上表现突出,适合高并发验证场景,但证明生成仍面临性能瓶颈;安全多方计算在多机构协作计算中优势明显,近年通过协议优化与硬件协同实现了工程部署可行性.另外,对3类算法的性能和适用场景进行对比分析,并对未来研究中算法通用性与专用性的动态平衡以及性能、安全与可解释性的多维权衡进行了展望,为后续高性能加密算法设计与应用部署提供参考. 展开更多
关键词 隐私计算 高性能加密算法 同态加密 零知识证明 安全多方计算
在线阅读 下载PDF
基于RSA的访问数据匿名签名安全认证方法
20
作者 武伟 刘宏英 曲霄红 《现代电子技术》 北大核心 2026年第4期47-51,共5页
针对访问数据时,访问请求信息中包含个人或组织的敏感信息,且未加密的请求数据在认证传输过程中容易被第三方恶意修改或插入其他内容的问题,提出一种基于RSA的访问数据匿名签名安全认证方法。利用基于角色的访问控制机制,由基于RSA算法... 针对访问数据时,访问请求信息中包含个人或组织的敏感信息,且未加密的请求数据在认证传输过程中容易被第三方恶意修改或插入其他内容的问题,提出一种基于RSA的访问数据匿名签名安全认证方法。利用基于角色的访问控制机制,由基于RSA算法的访问请求信息加密方法对访问请求数据进行加密,并为访问系统中每个用户角色分配RSA密钥对,公钥共享给所有成员(管理员与用户);当用户申请访问数据时,采用基于环签名的匿名认证方法,使用多个成员的公钥生成环签名,以实现对访问请求的安全匿名认证。管理员使用公钥验证匿名签名,认证通过后解密访问请求数据并授权访问。测试结果表明:所提方法使用于某风电系统后,系统仅支持访问数据匿名签名安全认证合格的用户访问;且该方法具有高效率数据加解密能力,加密过程中素数位数为90 bit时,能保证系统的抗攻击能力更强。 展开更多
关键词 匿名签名 数据加密 RSA算法 安全认证 环签名 密钥设计
在线阅读 下载PDF
上一页 1 2 112 下一页 到第
使用帮助 返回顶部