يعرض 1 - 20 نتائج من 95 نتيجة بحث عن 'feature encryption algorithm', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1

    Comparison of homomorphic encryption algorithms. حسب JiaMing Wang (334865)

    منشور في 2024
    "…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …"
  2. 2
  3. 3
  4. 4

    Raw power traces collected by encryption board. حسب Feng Ni (160522)

    منشور في 2022
    الموضوعات:
  5. 5
  6. 6

    Extraction and fusion of multi-scale features. حسب Feng Ni (160522)

    منشور في 2022
    الموضوعات:
  7. 7

    Multi-scale features fusion module. حسب Feng Ni (160522)

    منشور في 2022
    الموضوعات:
  8. 8
  9. 9

    Encryption time (sec). حسب Shahnwaz Afzal (22184546)

    منشور في 2025
    "…Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. …"
  10. 10

    Encryption time (sec). حسب Shahnwaz Afzal (22184546)

    منشور في 2025
    "…Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. …"
  11. 11

    Paillier homomorphic encryption and decryption. حسب JiaMing Wang (334865)

    منشور في 2024
    "…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …"
  12. 12
  13. 13
  14. 14

    Encryption throughput (Byte/sec). حسب Shahnwaz Afzal (22184546)

    منشور في 2025
    "…Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. …"
  15. 15

    Encryption throughput (Kb/sec). حسب Shahnwaz Afzal (22184546)

    منشور في 2025
    "…Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. …"
  16. 16
  17. 17

    Schematic diagram of feature template extraction. حسب Zhigang Song (113445)

    منشور في 2025
    "…The framework first utilizes a pre-trained model to extract facial feature templates, which are then encrypted. The encrypted templates are matched using Euclidean distance, with the final recognition being performed after decryption. …"
  18. 18

    Development of authentication algorithms for IEC 61850 goose and sampled value messages حسب Africa Ndzeku (18076258)

    منشور في 2025
    "…The EtM algorithm is proposed for maintaining message confidentiality and integrity, with AES-128 encryption for privacy and MAC algorithms for message authentication. …"
  19. 19
  20. 20