Showing 1 - 20 results of 2,358 for search 'data ((generation algorithm) OR (encryption algorithm))', query time: 0.49s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    The principles of the SM2 algorithm. by He-Jun Lu (11278574)

    Published 2025
    “…Experimental evaluations demonstrate the system’s strong security performance and communication efficiency: SM2 achieves up to 642 times faster key generation and 2.2 times faster decryption compared to RSA-3072; SM3 improves hashing performance by up to 11.5% over SHA-256; and SM4 delivers up to 22% higher encryption efficiency than AES-256 for small data blocks. …”
  9. 9

    The SM3 cryptographic hash algorithm. by He-Jun Lu (11278574)

    Published 2025
    “…Experimental evaluations demonstrate the system’s strong security performance and communication efficiency: SM2 achieves up to 642 times faster key generation and 2.2 times faster decryption compared to RSA-3072; SM3 improves hashing performance by up to 11.5% over SHA-256; and SM4 delivers up to 22% higher encryption efficiency than AES-256 for small data blocks. …”
  10. 10
  11. 11

    SM4 cryptographic algorithm flow chart. by He-Jun Lu (11278574)

    Published 2025
    “…Experimental evaluations demonstrate the system’s strong security performance and communication efficiency: SM2 achieves up to 642 times faster key generation and 2.2 times faster decryption compared to RSA-3072; SM3 improves hashing performance by up to 11.5% over SHA-256; and SM4 delivers up to 22% higher encryption efficiency than AES-256 for small data blocks. …”
  12. 12
  13. 13

    Comparison of homomorphic encryption algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Encryption performance. by Ali Shahzad (15251641)

    Published 2024
    “…Our analyses show that this algorithm significantly improves the security and efficiency of health data exchanges. …”