This is our latest selection of worldwide publications and patents in english on Encryption, between many scientific online journals, classified and focused on encryption, cryptography, cipher, AES, cryptanalysis, Diffie-Hellman, hash function, RSA algorithm, digital signature, cryptographic key, certificate authority, public key, private key and elliptic curve.
Large Language Model-Guided SARSA Algorithm for Dynamic Task Scheduling in Cloud Computing
Published on 2025-03-11 by Bhargavi Krishnamurthy, Sajjan G. Shiva @MDPI
Abstract: Nowadays, more enterprises are rapidly transitioning to cloud computing as it has become an ideal platform to perform the development and deployment of software systems. Because of its growing popularity, around ninety percent of enterprise applications rely on cloud computing solutions. The inherent dynamic and uncertain nature of cloud computing makes it difficult to accurately measure the exact state of a system at any given point in time. Potential challenges arise with respect to task sched[...]
Our summary: Large Language Model-Guided SARSA Algorithm improves task scheduling in cloud computing by enhancing SARSA learning with LLM heuristics, reducing bias and improving performance. Mathematical modeling and experimental results validate the effectiveness of the proposed approach.
Large Language Model, SARSA Algorithm, Dynamic Task Scheduling, Cloud Computing
Publication
Efficient Scalar Multiplication of ECC Using Lookup Table and Fast Repeating Point Doubling
Published on 2025-03-11 by Fu-Jung Kan, Yan-Haw Chen, Jeng-Jung Wang, Chong-Dao Lee @MDPI
Abstract: Reducing the computation time of scalar multiplication for elliptic curve cryptography is a significant challenge. This study proposes an efficient scalar multiplication method for elliptic curves over finite fields GF(2m). The proposed method first converts the scalar into a binary number. Then, using Horner’s rule, the binary number is divided into fixed-length bit-words. Each bit-word undergoes repeating point doubling, which can be precomputed. However, repeating point doubling[...]
Our summary: Efficient method for scalar multiplication of ECC using lookup table and fast repeating point doubling, reducing computation time significantly, outperforming sliding window method.
Scalar Multiplication, Elliptic Curve Cryptography, Lookup Table, Point Doubling
Publication
Takagi–Sugeno–Kang Fuzzy Neural Network for Nonlinear Chaotic Systems and Its Utilization in Secure Medical Image Encryption
Published on 2025-03-11 by Duc Hung Pham, Mai The Vu @MDPI
Abstract: This study introduces a novel control framework based on the Takagi–Sugeno–Kang wavelet fuzzy neural network, integrating brain imitated network and cerebellar network. The proposed controller demonstrates high robustness, making it an excellent candidate for handling intricate nonlinear dynamics, effectively mapping input–output relationships and efficiently learning from data. To enhance its performance, the controller’s parameters are fi[...]
Our summary: Novel control framework based on Takagi-Sugeno-Kang wavelet fuzzy neural network, high robustness, parameters fine-tuned using Lyapunov stability theory, superior learning capabilities and outstanding performance metrics, synchronization technique applied to secure transmission of medical images, experimental results confirm effectiveness and reliability.
Takagi-Sugeno-Kang, Fuzzy Neural Network, Secure Medical Image Encryption, Nonlinear Chaotic Systems
Publication
A Reliable and Privacy-Preserving Framework for Federated Learning-Based IoT Malware Detection
Published on 2025-03-10 by Mohammed Asiri, Maher A. Khemakhem, Reemah M. Alhebshi, Bassma S. Alsulami, Fathy E. Eassa @MDPI
Abstract: The proliferation of Internet of Things (IoT) devices and their vulnerability to malware infections pose critical security challenges in IoT networks and multi-access edge computing (MEC). Traditional federated learning-based IoT malware detection (FL-IMD) methods face limitations in privacy, reliability, and client authentication, necessitating innovative solutions. This study proposes a reliable and privacy-preserving federated learning framework (RPFL) that integrates elliptic curve digital s[...]
Our summary: A study proposes a reliable and privacy-preserving federated learning framework integrating ECDSA, homomorphic encryption, and blockchain technology. Experimental results show RPFL achieves high accuracy in IoT malware detection while enhancing reliability and privacy. RPFL outperforms BCFL in reducing communication costs and latency.
federated learning, IoT malware detection, privacy-preserving framework, reliability
Publication
A High-Entropy True Random Number Generator with Keccak Conditioning for FPGA
Published on 2025-03-08 by Valeria Piscopo, Alessandra Dolmeta, Mattia Mirigaldi, Maurizio Martina, Guido Masera @MDPI
Abstract: Any cryptographic system strongly relies on randomness to ensure robust encryption and masking methods. True Random Number Generators play a fundamental role in this context. The National Institute of Standards and Technology (NIST) and the Bundesamt für Sicherheit in der Informationstechnik (BSI) provide guidelines for designing reliable entropy sources to fuel cryptographic Random Bit Generators. This work presents a highly parameterized, open-source implementation of a TRNG based[...]
Our summary: Implementation of a highly parameterized TRNG with optimized Keccak conditioning unit, meeting NIST and BSI guidelines, achieving high min-entropy per bit.
True Random Number Generator, High-Entropy, Keccak Conditioning, FPGA
Publication
Mathematical Proposal for Securing Split Learning Using Homomorphic Encryption and Zero-Knowledge Proofs
Published on 2025-03-07 by Agon Kokaj, Elissa Mollakuqe @MDPI
Abstract: This work presents a mathematical solution to data privacy and integrity issues in Split Learning which uses Homomorphic Encryption (HE) and Zero-Knowledge Proofs (ZKP). It allows calculations to be conducted on encrypted data, keeping the data private, while ZKP ensures the correctness of these calculations without revealing the underlying data. Our proposed system, HavenSL, combines HE and ZKP to provide strong protection against attacks. It uses Discrete Cosine Transform (DCT) to analyze mode[...]
Our summary: Mathematical proposal for securing Split Learning using Homomorphic Encryption and Zero-Knowledge Proofs. It combines HE and ZKP to protect data privacy and integrity, detecting unusual changes in parameters and providing a rollback feature for harmful changes. Feasibility and accuracy are maintained in experiments on CIFAR-10, MNIST, and Fashion-MNIST datasets.
Homomorphic Encryption, Zero-Knowledge Proofs, Split Learning, Data Privacy
Publication
Network-independent dynamic encryption
Patent published on the 2025-03-06 in WO under Ref WO2025049427 by CONC3AL INC [US] (Ilic Igor [us], Quinn Cary [us], Chase Charles [us], Nastasi Franklin [us])
Abstract: A computer-implemented method to improve the safety of digital documents and assets, including for example digital tickets, may include the steps of: generating a salt/public key by obtaining a longitude and latitude of an event attendee smart device GPS chip and obtaining a time stamp from the smart device operating system; creating a static and unique ID; creating a data carrier/glyph/code, such creating a new quick response code, in intervals using data to be rehashed comprising the unique ID[...]
Our summary: A method for enhancing digital document safety by generating unique IDs and using GPS data to create dynamic encryption codes for validation.
dynamic encryption, digital documents, GPS chip, quick response code
Patent
Method and apparatus for confirming boarding of passenger in uam environment
Patent published on the 2025-03-06 in WO under Ref WO2025048366 by KIA CORP [KR] (Jung Chang Hun [kr], Park Seung Wook [kr])
Abstract: A method and an apparatus for confirming boarding of a passenger in a UAM environment are disclosed. According to one aspect of the present disclosure, the provided method, which is performed by a fuselage system supporting a function of checking whether a user has boarded a fuselage and taken a reserved seat, comprises the steps of: receiving, from a user terminal, a first encryption token including reservation information of the user and identification proof information; receiving, from a flig[...]
Our summary: Method and apparatus for confirming boarding of passenger in UAM environment by using encryption tokens and symmetric key to verify user reservation and seat allocation.
boarding, passenger, UAM, fuselage
Patent