Últimas publicaciones y patentes sobre cifrado

Consejo: además de esta selección sobre Aeronáutica, puede buscar y filtrar nuestros:
    * herramienta gratuita de búsqueda de publicaciones * por autor, tema, palabras clave, fecha o revista.
    * herramienta gratuita de búsqueda de patentes * para patentes en inglés de la Oficina Europea de Patentes.

This is our latest selection of worldwide publications and patents in english on Encryption, between many scientific online journals, classified and focused on encryption, cryptography, cipher, AES, cryptanalysis, Diffie-Hellman, hash function, RSA algorithm, digital signature, cryptographic key, certificate authority, public key, private key and elliptic curve.

Large Language Model-Guided SARSA Algorithm for Dynamic Task Scheduling in Cloud Computing

Published on 2025-03-11 by Bhargavi Krishnamurthy, Sajjan G. Shiva @MDPI

Abstract: Nowadays, more enterprises are rapidly transitioning to cloud computing as it has become an ideal platform to perform the development and deployment of software systems. Because of its growing popularity, around ninety percent of enterprise applications rely on cloud computing solutions. The inherent dynamic and uncertain nature of cloud computing makes it difficult to accurately measure the exact state of a system at any given point in time. Potential challenges arise with respect to task sched[...]


Our summary: Large Language Model-Guided SARSA Algorithm improves task scheduling in cloud computing by enhancing SARSA learning with LLM heuristics, reducing bias and improving performance. Mathematical modeling and experimental results validate the effectiveness of the proposed approach.

Large Language Model, SARSA Algorithm, Dynamic Task Scheduling, Cloud Computing

Publication

Efficient Scalar Multiplication of ECC Using Lookup Table and Fast Repeating Point Doubling

Published on 2025-03-11 by Fu-Jung Kan, Yan-Haw Chen, Jeng-Jung Wang, Chong-Dao Lee @MDPI

Abstract: Reducing the computation time of scalar multiplication for elliptic curve cryptography is a significant challenge. This study proposes an efficient scalar multiplication method for elliptic curves over finite fields GF(2m). The proposed method first converts the scalar into a binary number. Then, using Horner’s rule, the binary number is divided into fixed-length bit-words. Each bit-word undergoes repeating point doubling, which can be precomputed. However, repeating point doubling[...]


Our summary: Efficient method for scalar multiplication of ECC using lookup table and fast repeating point doubling, reducing computation time significantly, outperforming sliding window method.

Scalar Multiplication, Elliptic Curve Cryptography, Lookup Table, Point Doubling

Publication

Takagi–Sugeno–Kang Fuzzy Neural Network for Nonlinear Chaotic Systems and Its Utilization in Secure Medical Image Encryption

Published on 2025-03-11 by Duc Hung Pham, Mai The Vu @MDPI

Abstract: This study introduces a novel control framework based on the Takagi–Sugeno–Kang wavelet fuzzy neural network, integrating brain imitated network and cerebellar network. The proposed controller demonstrates high robustness, making it an excellent candidate for handling intricate nonlinear dynamics, effectively mapping input–output relationships and efficiently learning from data. To enhance its performance, the controller’s parameters are fi[...]


Our summary: Novel control framework based on Takagi-Sugeno-Kang wavelet fuzzy neural network, high robustness, parameters fine-tuned using Lyapunov stability theory, superior learning capabilities and outstanding performance metrics, synchronization technique applied to secure transmission of medical images, experimental results confirm effectiveness and reliability.

Takagi-Sugeno-Kang, Fuzzy Neural Network, Secure Medical Image Encryption, Nonlinear Chaotic Systems

Publication

A Reliable and Privacy-Preserving Framework for Federated Learning-Based IoT Malware Detection

Published on 2025-03-10 by Mohammed Asiri, Maher A. Khemakhem, Reemah M. Alhebshi, Bassma S. Alsulami, Fathy E. Eassa @MDPI

Abstract: The proliferation of Internet of Things (IoT) devices and their vulnerability to malware infections pose critical security challenges in IoT networks and multi-access edge computing (MEC). Traditional federated learning-based IoT malware detection (FL-IMD) methods face limitations in privacy, reliability, and client authentication, necessitating innovative solutions. This study proposes a reliable and privacy-preserving federated learning framework (RPFL) that integrates elliptic curve digital s[...]


Our summary: A study proposes a reliable and privacy-preserving federated learning framework integrating ECDSA, homomorphic encryption, and blockchain technology. Experimental results show RPFL achieves high accuracy in IoT malware detection while enhancing reliability and privacy. RPFL outperforms BCFL in reducing communication costs and latency.

federated learning, IoT malware detection, privacy-preserving framework, reliability

Publication

A High-Entropy True Random Number Generator with Keccak Conditioning for FPGA

Published on 2025-03-08 by Valeria Piscopo, Alessandra Dolmeta, Mattia Mirigaldi, Maurizio Martina, Guido Masera @MDPI

Abstract: Any cryptographic system strongly relies on randomness to ensure robust encryption and masking methods. True Random Number Generators play a fundamental role in this context. The National Institute of Standards and Technology (NIST) and the Bundesamt für Sicherheit in der Informationstechnik (BSI) provide guidelines for designing reliable entropy sources to fuel cryptographic Random Bit Generators. This work presents a highly parameterized, open-source implementation of a TRNG based[...]


Our summary: Implementation of a highly parameterized TRNG with optimized Keccak conditioning unit, meeting NIST and BSI guidelines, achieving high min-entropy per bit.

True Random Number Generator, High-Entropy, Keccak Conditioning, FPGA

Publication

Mathematical Proposal for Securing Split Learning Using Homomorphic Encryption and Zero-Knowledge Proofs

Published on 2025-03-07 by Agon Kokaj, Elissa Mollakuqe @MDPI

Abstract: This work presents a mathematical solution to data privacy and integrity issues in Split Learning which uses Homomorphic Encryption (HE) and Zero-Knowledge Proofs (ZKP). It allows calculations to be conducted on encrypted data, keeping the data private, while ZKP ensures the correctness of these calculations without revealing the underlying data. Our proposed system, HavenSL, combines HE and ZKP to provide strong protection against attacks. It uses Discrete Cosine Transform (DCT) to analyze mode[...]


Our summary: Mathematical proposal for securing Split Learning using Homomorphic Encryption and Zero-Knowledge Proofs. It combines HE and ZKP to protect data privacy and integrity, detecting unusual changes in parameters and providing a rollback feature for harmful changes. Feasibility and accuracy are maintained in experiments on CIFAR-10, MNIST, and Fashion-MNIST datasets.

Homomorphic Encryption, Zero-Knowledge Proofs, Split Learning, Data Privacy

Publication

Network-independent dynamic encryption

Patent published on the 2025-03-06 in WO under Ref WO2025049427 by CONC3AL INC [US] (Ilic Igor [us], Quinn Cary [us], Chase Charles [us], Nastasi Franklin [us])

Abstract: A computer-implemented method to improve the safety of digital documents and assets, including for example digital tickets, may include the steps of: generating a salt/public key by obtaining a longitude and latitude of an event attendee smart device GPS chip and obtaining a time stamp from the smart device operating system; creating a static and unique ID; creating a data carrier/glyph/code, such creating a new quick response code, in intervals using data to be rehashed comprising the unique ID[...]


Our summary: A method for enhancing digital document safety by generating unique IDs and using GPS data to create dynamic encryption codes for validation.

dynamic encryption, digital documents, GPS chip, quick response code

Patent

Method and apparatus for confirming boarding of passenger in uam environment

Patent published on the 2025-03-06 in WO under Ref WO2025048366 by KIA CORP [KR] (Jung Chang Hun [kr], Park Seung Wook [kr])

Abstract: A method and an apparatus for confirming boarding of a passenger in a UAM environment are disclosed. According to one aspect of the present disclosure, the provided method, which is performed by a fuselage system supporting a function of checking whether a user has boarded a fuselage and taken a reserved seat, comprises the steps of: receiving, from a user terminal, a first encryption token including reservation information of the user and identification proof information; receiving, from a flig[...]


Our summary: Method and apparatus for confirming boarding of passenger in UAM environment by using encryption tokens and symmetric key to verify user reservation and seat allocation.

boarding, passenger, UAM, fuselage

Patent

Table of Contents
    Añadir una cabecera para empezar a generar el índice

    ¿DISEÑO o RETO DE COSTES?
    Diseñador de Producto Senior o Director de I+D.
    Desarrollo eficaz de productos

    Disponible a corto plazo en Francia y Suiza.
    Póngase en contacto conmigo en LinkedIn
    Diseño al coste, Ergonomía, Volumen medio a alto, Industrias reguladas, CE y FDA, CAD, Solidworks, Cinturón negro Lean Sigma, ISO 13485 médica Clase II y III

    Universidad ?
    Institución ?

    ¿Le gustaría convertirse en socio de este sitio alojándolo?
    > envíanos un mensaje <

    Temas tratados: Cifrado, Criptografía, Cifrado, AES, Criptoanálisis, Diffie-Hellman, Función Hash, Algoritmo RSA, Firma Digital, Clave Criptográfica, Autoridad de Certificación, Clave Pública, Clave Privada, Curva Elíptica, Cifrado Homomórfico, Pruebas de Conocimiento Cero, Firmas Ciegas, Tecnologías de Mejora de la Privacidad

    es_ESES
    Scroll al inicio