-
181
Comparison of biological encryption technologies. This table summarizes various bio-inspired encryption methods, highlighting their features, advantages, and limitations. DNA-based cryptography uses DNA’s high information density and parallel processing for secure communication. Cellular automata encryption employs the dynamic properties of these systems, inspired by biological cells, to create complex patterns. Chaotic systems, mimicking unpredictable biological processes, are used in cryptography due to their sensitivity to initial conditions. Evolutionary algorithms, inspired by biological evolution, aim to enhance cryptographic methods. However, these methods face challenges like scalability, implementation issues, and the need for more research to ensure security. The proposed proteinoid-based cryptography in this paper aims to utilize the unique properties of proteinoid assemblies—self-organization and molecular recognition—to create a new, secure encryption
منشور في 2025"…The proposed proteinoid-based cryptography in this paper aims to utilize the unique properties of proteinoid assemblies—self-organization and molecular recognition—to create a new, secure encryption</p>…"
-
182
Proteinoid-based encryption process. The setup involves importing measurement data, including voltage, capacitance, impedance, and resistance, from various proteinoid samples.
منشور في 2025"…<p>A designated proteinoid sample is selected as the encryption key based on its unique electrical properties. …"
-
183
Portable Library for Homomorphic Encrypted Machine Learning on FPGA Accelerated Cloud Cyberinfrastructure
منشور في 2025"…<p dir="ltr">Data privacy has had implications for deploying data-sensitive machine learning (ML) inference applications to cloud cyberinfrastructure (CI). Homomorphic Encryption (HE), which allows arbitrary computations on encrypted data, provides a potential solution to these challenges. …"
-
184
Security algorithm framework.
منشور في 2024"…We proposed a blockchain-based method for secure EHR management and integrated Ciphertext-Policy Attribute-Based Encryption (CP-ABE) for fine-grained access control. …"
-
185
Example of byte substitution Process.
منشور في 2025"…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
-
186
Example of S-box.
منشور في 2025"…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
-
187
Example of addroundkey process.
منشور في 2025"…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
-
188
Bifurcation diagram analysis results.
منشور في 2025"…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
-
189
Information entropy analysis results.
منشور في 2025"…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
-
190
Lyapunov exponent of different chaotic maps.
منشور في 2025"…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
-
191
-
192
-
193
-
194
-
195
-
196
-
197
-
198
-
199
Experimental images&Table1-10&Figure1-15.docx
منشور في 2025"…<p dir="ltr">A Robust Color Image Encryption Algorithm Based on 2D-SQSM Hyperchaotic Map and Cyclic Shift Scrambling</p>…"
-
200
This figure shows a condensed process.
منشور في 2025"…<p>It encrypts and decrypts the message “Hello, World!” using a novel, proteinoid-based cryptographic system. …"