بدائل البحث:
feature encryption » feature description (توسيع البحث), feature extraction (توسيع البحث)
feature encryption » feature description (توسيع البحث), feature extraction (توسيع البحث)
-
1
Comparison of homomorphic encryption algorithms.
منشور في 2024"…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …"
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
Encryption time (sec).
منشور في 2025"…Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. …"
-
10
Encryption time (sec).
منشور في 2025"…Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. …"
-
11
Paillier homomorphic encryption and decryption.
منشور في 2024"…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …"
-
12
-
13
-
14
Encryption throughput (Byte/sec).
منشور في 2025"…Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. …"
-
15
Encryption throughput (Kb/sec).
منشور في 2025"…Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. …"
-
16
-
17
Schematic diagram of feature template extraction.
منشور في 2025"…The framework first utilizes a pre-trained model to extract facial feature templates, which are then encrypted. The encrypted templates are matched using Euclidean distance, with the final recognition being performed after decryption. …"
-
18
Development of authentication algorithms for IEC 61850 goose and sampled value messages
منشور في 2025"…The EtM algorithm is proposed for maintaining message confidentiality and integrity, with AES-128 encryption for privacy and MAC algorithms for message authentication. …"
-
19
-
20