Search alternatives:
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), selection algorithm (Expand Search)
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), selection algorithm (Expand Search)
-
1
-
2
-
3
-
4
-
5
Comparative analysis of proposed algorithms with state-of-the-art prime algorithms.
Published 2024Subjects: -
6
Execution times (in seconds) of various prime number generation algorithms.
Published 2024Subjects: -
7
-
8
The principles of the SM2 algorithm.
Published 2025“…Experimental evaluations demonstrate the system’s strong security performance and communication efficiency: SM2 achieves up to 642 times faster key generation and 2.2 times faster decryption compared to RSA-3072; SM3 improves hashing performance by up to 11.5% over SHA-256; and SM4 delivers up to 22% higher encryption efficiency than AES-256 for small data blocks. …”
-
9
The SM3 cryptographic hash algorithm.
Published 2025“…Experimental evaluations demonstrate the system’s strong security performance and communication efficiency: SM2 achieves up to 642 times faster key generation and 2.2 times faster decryption compared to RSA-3072; SM3 improves hashing performance by up to 11.5% over SHA-256; and SM4 delivers up to 22% higher encryption efficiency than AES-256 for small data blocks. …”
-
10
-
11
SM4 cryptographic algorithm flow chart.
Published 2025“…Experimental evaluations demonstrate the system’s strong security performance and communication efficiency: SM2 achieves up to 642 times faster key generation and 2.2 times faster decryption compared to RSA-3072; SM3 improves hashing performance by up to 11.5% over SHA-256; and SM4 delivers up to 22% higher encryption efficiency than AES-256 for small data blocks. …”
-
12
-
13
Comparison of homomorphic encryption algorithms.
Published 2024“…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
-
14
-
15
-
16
-
17
-
18
-
19
-
20
Encryption performance.
Published 2024“…Our analyses show that this algorithm significantly improves the security and efficiency of health data exchanges. …”