Search alternatives:
resource encryption » resource extraction (Expand Search)
Showing 1 - 20 results of 69 for search 'resource encryption algorithm', query time: 0.11s Refine Results
  1. 1

    Encryption performance. by Ali Shahzad (15251641)

    Published 2024
    “…Our analyses show that this algorithm significantly improves the security and efficiency of health data exchanges. …”
  2. 2
  3. 3

    Encryption time (sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…A subsequent study analyzing the avalanche effect and correlation coefficients reinforces the strength of the encryption. The proposed encryption method, designed for resource-constrained environments, provides efficient and robust cryptographic security to protect IoT data effectively.…”
  4. 4

    Encryption time (sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…A subsequent study analyzing the avalanche effect and correlation coefficients reinforces the strength of the encryption. The proposed encryption method, designed for resource-constrained environments, provides efficient and robust cryptographic security to protect IoT data effectively.…”
  5. 5
  6. 6

    Encryption throughput (Byte/sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…A subsequent study analyzing the avalanche effect and correlation coefficients reinforces the strength of the encryption. The proposed encryption method, designed for resource-constrained environments, provides efficient and robust cryptographic security to protect IoT data effectively.…”
  7. 7

    Encryption throughput (Kb/sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…A subsequent study analyzing the avalanche effect and correlation coefficients reinforces the strength of the encryption. The proposed encryption method, designed for resource-constrained environments, provides efficient and robust cryptographic security to protect IoT data effectively.…”
  8. 8

    Data Sheet 1_Constructing resource-efficient quantum circuits for AES.pdf by Liao-Liang Jiang (21158561)

    Published 2025
    “…<p>An efficient quantum implementation of the advanced encryption standard (AES) is crucial for reducing the complexity of implementing an exhaustive key search through Grover’s algorithm. …”
  9. 9

    Security algorithm framework. by Ali Shahzad (15251641)

    Published 2024
    “…Our analyses show that this algorithm significantly improves the security and efficiency of health data exchanges. …”
  10. 10
  11. 11
  12. 12

    Supplementary file 1_Efficient lightweight cryptographic solutions for enhancing data security in healthcare systems based on IoT.zip by Abdul Muhammed Rasheed (20998115)

    Published 2025
    “…The proposed models demonstrate excellent encryption performance, minimal computational complexity, and robust resistance to attacks, rendering them well-suited for resource-limited IoT settings. …”
  13. 13

    Cryptography in IoT Using Elliptic Curve Cryptography with Adaptive Hunter-Prey Optimization by C.A. Yogaraja (20741304)

    Published 2025
    “…Then, the encrypted data are hashed by the MD-5 algorithm. The suggested model addresses the need for reduced computational load and power consumption in IoT environments and maintaining a high level of security. …”
  14. 14

    Arithmetic modules. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  15. 15

    SDF Unit. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  16. 16

    8-point DIT NTT data flow. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  17. 17

    First two stages of pipelined SDFNTT for Kyber. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  18. 18

    Unified CT/GS radix-2 butterfly architecture. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  19. 19

    PUs connected in pipelined SDFNTT for Kyber. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  20. 20

    Dataflow of first two stages for Kyber SDFNTT. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”