期刊文献+
共找到2,213篇文章
< 1 2 111 >
每页显示 20 50 100
An Image Encryption Algorithm Based on BP Neural Network and Hyperchaotic System 被引量:10
1
作者 Feifei Yang Jun Mou +1 位作者 Yinghong Cao Ran Chu 《China Communications》 SCIE CSCD 2020年第5期21-28,共8页
To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryption algorithm based... To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryption algorithm based on fractional-order memristive hyperchaotic system and BP neural network is proposed. In this algorithm, the image pixel values are compressed by BP neural network, the chaotic sequences of the fractional-order memristive hyperchaotic system are used to diffuse the pixel values. The experimental simulation results indicate that the proposed algorithm not only can effectively compress and encrypt image, but also have better security features. Therefore, this work provides theoretical guidance and experimental basis for the safe transmission and storage of image information in practical communication. 展开更多
关键词 BP neural network fractional-order hyperchaotic system image encryption algorithm secure communication
在线阅读 下载PDF
A realizable quantum encryption algorithm for qubits 被引量:5
2
作者 周南润 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第11期2164-2169,共6页
A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext spa... A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext space expanded greatly. The security of the proposed algorithm is analysed in detail and the schematic physical implementation is also provided. It is shown that the algorithm, which can prevent quantum attack strategy as well as classical attack strategy, is effective to protect qubits. Finally, we extend our algorithm to encrypt classical binary bits and quantum entanglements. 展开更多
关键词 quantum encryption algorithm quantum computation CRYPTOGRAPHY
原文传递
An Analysis of International Data Encryption Algorithm(IDEA) Security against Differential Cryptanalysis 被引量:3
3
作者 CHEN Jia XUE Dongyue LAI Xuejia 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期697-701,共5页
The security of international date encryption algorithm (IDEA(16)), a mini IDEA cipher, against differential cryptanalysis is investigated. The results show that [DEA(16) is secure against differential cryptanal... The security of international date encryption algorithm (IDEA(16)), a mini IDEA cipher, against differential cryptanalysis is investigated. The results show that [DEA(16) is secure against differential cryptanalysis attack after 5 rounds while IDEA(8) needs 7 rounds for the same level of security. The transition matrix for IDEA(16) and its eigenvalue of second largest magnitude are computed. The storage method for the transition matrix has been optimized to speed up file I/O. The emphasis of the work lies in finding out an effective way of computing the eigenvalue of the matrix. To lower time complexity, three mature algorithms in finding eigenvalues are compared from one another and subspace iteration algorithm is employed to compute the eigenvalue of second largest module, with a precision of 0.001. 展开更多
关键词 international date encryption algorithm(IDEA) cipher differential cryptanalysis Markov cipher transition matrix subspace iteration
原文传递
A self-cited pixel summation based image encryption algorithm 被引量:1
4
作者 Guo-Dong Ye Xiao-Ling Huang +1 位作者 Leo Yu Zhang Zheng-Xia Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第1期131-138,共8页
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make ... In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security. 展开更多
关键词 pixel summation image encryption algorithm intertwining logistic map GRAVITY SECURITY
原文传递
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing 被引量:1
5
作者 王兴元 王哓丽 +2 位作者 滕琳 蒋东华 咸永锦 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期136-149,共14页
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. First, a dynamic spiral block scrambling is designed to encrypt the sparse matrix generated by performing discrete wavelet transform(DWT)on the plain image. Then, the encrypted image is compressed and quantified to obtain the noise-like cipher image. Then the cipher image is embedded into the alpha channel of the carrier image in portable network graphics(PNG) format to generate the visually meaningful steganographic image. In our scheme, the hyperchaotic Lorenz system controlled by the hash value of plain image is utilized to construct the scrambling matrix, the measurement matrix and the embedding matrix to achieve higher security. In addition, compared with other existing encryption algorithms, the proposed PNG-based embedding method can blindly extract the cipher image, thus effectively reducing the transmission cost and storage space. Finally, the experimental results indicate that the proposed encryption algorithm has very high visual security. 展开更多
关键词 chaotic image encryption compressive sensing meaningful cipher image portable network graphics image encryption algorithm
原文传递
An image joint compression-encryption algorithm based on adaptive arithmetic coding
6
作者 邓家先 邓海涛 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第9期403-408,共6页
Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process o... Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process of image compression are modified by keys in order to achieve image joint compression encryption. Combined with the bit-plane coding technique, the discrete wavelet transform coefficients in different resolutions can be encrypted respectively with different keys, so that the resolution selective encryption is realized to meet different application needs. Zero-tree coding is improved, and adaptive arithmetic coding is introduced. Then, the proposed joint compression-encryption algorithm is simulated. The simulation results show that as long as the parameters are selected appropriately, the compression efficiency of proposed image joint compression-encryption algorithm is basically identical to that of the original image compression algorithm, and the security of the proposed algorithm is better than the joint encryption algorithm based on interval splitting. 展开更多
关键词 image compression joint compression-encryption algorithm arithmetic encryption progressiveclassification encryption
原文传递
Enhancement of Video Encryption Algorithm Performance Using Finite Field Z2^3-Based Chaotic Cipher
7
作者 M. T. Suryadi B. Budiardjo K. Ramli 《通讯和计算机(中英文版)》 2012年第8期960-964,共5页
关键词 混沌密码 有限域 加密算法 性能 视频 已知明文攻击 加密过程 密码学
在线阅读 下载PDF
Algebraic Cryptanalysis of GOST Encryption Algorithm
8
作者 Ludmila Babenko Ekaterina Maro 《Journal of Computer and Communications》 2014年第4期10-17,共8页
This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic an... This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define relations between a secret key and a cipher text. Extended linearization method is evaluated as a method for solving the nonlinear sys- tem of equations. 展开更多
关键词 encryption algorithm GOST GOST S-BOX Systems of MULTIVARIATE QUADRATIC Equations ALGEBRAIC CRYPTANALYSIS Extended LINEARIZATION Method Gaussian Elimination
在线阅读 下载PDF
Logical mistakes in NTRU compensation algorithm and improvement of encryption verification algorithm
9
作者 QUAN Yi-ning LI Xin-she HU Yu-pu 《通讯和计算机(中英文版)》 2008年第6期35-41,共7页
关键词 逻辑错误 计算方法 解码 信息技术
在线阅读 下载PDF
An algorithm of file encryption based on sum function sequences
10
作者 ZHOU Lei LU Hai-lian +1 位作者 SUN Yu-qiang GU Yu-wan 《通讯和计算机(中英文版)》 2008年第1期48-52,共5页
关键词 和函数序列 编码算法 信息安全 加密
在线阅读 下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
11
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos algorithm Image encryption and Decryption Two-Stage Logistic Mapping M Sequence
在线阅读 下载PDF
Analysis and Design for Unsymmetrical Block Encryption Algorithm
12
作者 王以刚 孔令飞 《Journal of China Textile University(English Edition)》 EI CAS 1999年第2期50-52,共3页
This article explains the imbalance in DES and introduces the operators in IDEA. At last it puts forward a Unsym-metrical Block Encryption Algorithm which is achieved by adding some operators to DES.
关键词 BLACK CIPHER CIPHER algorithm DES IDEA UNSYMMETRICAL block encryptION
在线阅读 下载PDF
Quantum color image encryption: Dual scrambling scheme based on DNA codec and quantum Arnold transform
13
作者 Tao Cheng Run-Sheng Zhao +2 位作者 Shuang Wang Kehan Wang Hong-Yang Ma 《Chinese Physics B》 2025年第1期235-244,共10页
In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quan... In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quantum Arnold transform(QAr T) to propose a new double encryption algorithm for quantum color images to improve the security and robustness of image encryption. First, we utilize the biological characteristics of DNA codecs to perform encoding and decoding operations on pixel color information in quantum color images, and achieve pixel-level diffusion. Second, we use QAr T to scramble the position information of quantum images and use the operated image as the key matrix for quantum XOR operations. All quantum operations in this paper are reversible, so the decryption operation of the ciphertext image can be realized by the reverse operation of the encryption process. We conduct simulation experiments on encryption and decryption using three color images of “Monkey”, “Flower”, and “House”. The experimental results show that the peak value and correlation of the encrypted images on the histogram have good similarity, and the average normalized pixel change rate(NPCR) of RGB three-channel is 99.61%, the average uniform average change intensity(UACI) is 33.41%,and the average information entropy is about 7.9992. In addition, the robustness of the proposed algorithm is verified by the simulation of noise interference in the actual scenario. 展开更多
关键词 DNA codec quantum Arnold transform quantum image encryption algorithm
原文传递
激光通信网络星间链路隐私数据汇聚传输方法
14
作者 周显春 焦萍萍 陈鹤鸣 《激光杂志》 北大核心 2026年第2期191-197,共7页
传统方法对层间链路加密分散数据时,仅依赖单一密钥,会缺乏多层次加密保护,降低了对隐私数据传输的精度。为此,提出激光通信网络星间链路隐私数据汇聚传输方法。采用模糊C均值聚类方法将各卫星链路上的数据汇聚到中心卫星上,引入三维维... 传统方法对层间链路加密分散数据时,仅依赖单一密钥,会缺乏多层次加密保护,降低了对隐私数据传输的精度。为此,提出激光通信网络星间链路隐私数据汇聚传输方法。采用模糊C均值聚类方法将各卫星链路上的数据汇聚到中心卫星上,引入三维维吉尼亚加密算法,通过双重密钥和加密幅值两次加密处理汇聚数据,以增强数据传输的安全性,计算同层星间链路和层间星间链路的距离与夹角,选取权重值最高的星间链路对两次加密后的数据展开安全汇聚传输。实验结果表明,该方法的隐私数据传输到目标卫星中的数据和原始数据之间的相似度超过99.5%,传输精度高于对比方法,而数据传输风险值低于0.25,数据传输风险值一直低于对比方法。 展开更多
关键词 激光通信网络 星间链路 隐私数据汇聚传输 模糊C均值 三维维吉尼亚加密算法
原文传递
基于1394仿真卡配置文件的加密设计与实现
15
作者 康磊 李乐乐 《工业控制计算机》 2026年第2期21-22,25,共3页
IEEE-1394总线是一种高性能串行通信协议,在航空、航天和工业控制等领域得到了广泛应用。随着航空航天领域电子设备的快速发展,仿真卡的配置文件面临被非法复制、篡改或逆向工程的风险,进而威胁系统安全性和知识产权保护。为此,提出了... IEEE-1394总线是一种高性能串行通信协议,在航空、航天和工业控制等领域得到了广泛应用。随着航空航天领域电子设备的快速发展,仿真卡的配置文件面临被非法复制、篡改或逆向工程的风险,进而威胁系统安全性和知识产权保护。为此,提出了一种基于加密存储与认证机制的配置文件保护方案。该方案在软件端采用AES对称加密算法对配置文件进行加密存储,并在硬件端通过加密芯片进行完整性验证。最后,在1394仿真卡上进行实验验证,结果表明配置文件的安全性得到了有效保障。 展开更多
关键词 1394总线 配置文件 AES加密算法 加密芯片
在线阅读 下载PDF
Reconfigurable implementation of AES algorithm IP core based on pipeline structure 被引量:6
16
作者 李冰 夏克维 梁文丽 《Journal of Southeast University(English Edition)》 EI CAS 2010年第1期21-25,共5页
In order to improve the data throughput of the advanced encryption standard (AES) IP core while reducing the hardware resource consumption and finally achieving a tradeoff between speed and area, a mixed pipeline ar... In order to improve the data throughput of the advanced encryption standard (AES) IP core while reducing the hardware resource consumption and finally achieving a tradeoff between speed and area, a mixed pipeline architecture and reconfigurable technology for the design and implementation of the AES IP core is proposed. The encryption and decryption processes of the AES algorithm are achieved in the same process within the mixed pipeline structure. According to the finite field characterizations, the Sbox in the AES algorithm is optimized. ShiftRow and MixColumn, which are the main components in AES round transformation, are optimized with the reconfigurable technology. The design is implemented on the Xilinx Virtex2p xc2vp20-7 field programmable gate array (FPGA) device. It can achieve a data throughput above 2.58 Gbit/s, and it only requires 3 233 slices. Compared with other related designs of AES IP cores on the same device, the proposed design can achieve a tradeoff between speed and area, and obtain satisfactory results in both data throughput and hardware resource consumption. 展开更多
关键词 advanced encryption standard (AES) algorithm RECONFIGURABLE PIPELINE finite field round transformation
在线阅读 下载PDF
隐私计算中的高性能加密算法研究
17
作者 姚文龙 毛华彬 傅彦铭 《信息安全研究》 北大核心 2026年第3期274-283,共10页
在数字经济快速发展的背景下,如何在保障数据隐私的前提下高效利用数据成为当前科技发展的核心挑战.隐私计算作为解决“数据可用不可见”问题的关键技术体系逐步走向实际应用.其中,同态加密、零知识证明和安全多方计算作为3大核心加密技... 在数字经济快速发展的背景下,如何在保障数据隐私的前提下高效利用数据成为当前科技发展的核心挑战.隐私计算作为解决“数据可用不可见”问题的关键技术体系逐步走向实际应用.其中,同态加密、零知识证明和安全多方计算作为3大核心加密技术,在理论构建与工程实现方面取得了显著进展,并在高性能计算环境中展现出广泛应用潜力.围绕上述3类高性能加密算法展开系统综述,介绍算法研究进展,并重点从计算效率、通信开销与高性能计算环境适配性3个维度进行分析.结果表明:同态加密适用于无需交互的数据处理任务,具备较强的自治性,但计算与通信开销较高;零知识证明在验证效率上表现突出,适合高并发验证场景,但证明生成仍面临性能瓶颈;安全多方计算在多机构协作计算中优势明显,近年通过协议优化与硬件协同实现了工程部署可行性.另外,对3类算法的性能和适用场景进行对比分析,并对未来研究中算法通用性与专用性的动态平衡以及性能、安全与可解释性的多维权衡进行了展望,为后续高性能加密算法设计与应用部署提供参考. 展开更多
关键词 隐私计算 高性能加密算法 同态加密 零知识证明 安全多方计算
在线阅读 下载PDF
基于RSA的访问数据匿名签名安全认证方法
18
作者 武伟 刘宏英 曲霄红 《现代电子技术》 北大核心 2026年第4期47-51,共5页
针对访问数据时,访问请求信息中包含个人或组织的敏感信息,且未加密的请求数据在认证传输过程中容易被第三方恶意修改或插入其他内容的问题,提出一种基于RSA的访问数据匿名签名安全认证方法。利用基于角色的访问控制机制,由基于RSA算法... 针对访问数据时,访问请求信息中包含个人或组织的敏感信息,且未加密的请求数据在认证传输过程中容易被第三方恶意修改或插入其他内容的问题,提出一种基于RSA的访问数据匿名签名安全认证方法。利用基于角色的访问控制机制,由基于RSA算法的访问请求信息加密方法对访问请求数据进行加密,并为访问系统中每个用户角色分配RSA密钥对,公钥共享给所有成员(管理员与用户);当用户申请访问数据时,采用基于环签名的匿名认证方法,使用多个成员的公钥生成环签名,以实现对访问请求的安全匿名认证。管理员使用公钥验证匿名签名,认证通过后解密访问请求数据并授权访问。测试结果表明:所提方法使用于某风电系统后,系统仅支持访问数据匿名签名安全认证合格的用户访问;且该方法具有高效率数据加解密能力,加密过程中素数位数为90 bit时,能保证系统的抗攻击能力更强。 展开更多
关键词 匿名签名 数据加密 RSA算法 安全认证 环签名 密钥设计
在线阅读 下载PDF
面向RNS-CKKS方案的同态计算硬件加速器
19
作者 陈星辰 郭家怡 +1 位作者 陈弟虎 粟涛 《计算机应用研究》 北大核心 2026年第1期208-215,共8页
针对全同态加密应用中数据存储和传输开销大、计算效率低的问题,以主流的RNS-CKKS方案为研究对象,提出了一种同态计算硬件加速器。该加速器为自同构算子设计了分治式置换网络,实现了高效无冲突的数据调度与路由。同时通过实施片内外协... 针对全同态加密应用中数据存储和传输开销大、计算效率低的问题,以主流的RNS-CKKS方案为研究对象,提出了一种同态计算硬件加速器。该加速器为自同构算子设计了分治式置换网络,实现了高效无冲突的数据调度与路由。同时通过实施片内外协同存储策略和对计算流进行重构,有效降低了硬件部署密钥切换操作的片上缓存需求并隐藏片外延迟。为进一步提升计算与资源效率,构建了统一的计算阵列并优化了片上缓存结构。在FPGA上的实验结果表明,该设计相比于OpenFHE软件函数库,实现了8.68~56.2倍的加速;相较于同类硬件加速方案,在密文-密文同态乘法上实现了1.18~1.53倍的加速以及1.10~4.98倍的面积效率提升,同时在可配置性方面具备一定优势。该工作有助于同态加密方案的硬件高效部署。 展开更多
关键词 全同态加密 RNS-CKKS算法 硬件加速器 可配置架构 现场可编程门阵列
在线阅读 下载PDF
基于同态加密算法的医院影像数据隐私保护研究
20
作者 何绪成 常媛媛 +1 位作者 王洋 马献 《医疗卫生装备》 2026年第2期47-51,共5页
目的:为了确保医院影像数据的安全性,提出一种基于同态加密算法的医院影像数据隐私保护方法。方法:首先,将原始医学影像划分为多个互不重叠的子块,对于同一子块的像素,采用一致的密钥展开加法同态加密,再对加密后的图像以子块为单位进行... 目的:为了确保医院影像数据的安全性,提出一种基于同态加密算法的医院影像数据隐私保护方法。方法:首先,将原始医学影像划分为多个互不重叠的子块,对于同一子块的像素,采用一致的密钥展开加法同态加密,再对加密后的图像以子块为单位进行Arnold置乱处理。之后根据医学影像像素值和预测值之间的差值绝对值确定嵌入条件,依据嵌入条件判定是否嵌入信息和嵌入容量,从而完成医院影像数据初步加密。其次,先基于混沌映射形成的阈值获取边缘映射,并选取双正弦映射生成随机序列,再将序列中的数值分配给阈值形成边缘映射,之后经正弦映射置乱、影像数据异或处理及混沌序列排序置换完成首轮加密增强,随后结合位平面操作实施像素级置乱与扩散,生成最终的密文图像,以保障影像隐私与安全。最后,在公开的肺影像数据库联盟(Lung Image Database Consortium,LIDC)数据集的医院影像数据集内选取部分肺部影像进行实验,比较提出的方法与基于混沌浮点运算的方法和基于光线投射采样的方法对肺部影像的加密效果。结果:与基于混沌浮点运算的方法和基于光线投射采样的方法相比,提出的方法平均加密时间更短、像素值平均改变强度(unified average changing intensity,UACI)和像素数变化率(number of pixels change rate,NPCR)更高,且加密后的图像无法识别出原始肺部影像中的任何信息。结论:提出的方法能够显著提升医院影像数据的隐私保护水平,防止数据被非法获取或误用。 展开更多
关键词 同态加密算法 医院影像数据 医学影像数据 隐私保护
在线阅读 下载PDF
上一页 1 2 111 下一页 到第
使用帮助 返回顶部