Latest Publications & Patents on Encryption

. Latest Publications & Patents on Encryption. Advanced Encryption Standard (AES)

Tip: further to this selection on Aeronautics, you can search and filter our:
    * free publications search tool * by author, topic, keywords, date or journal.
    * free patents search tool * for patents in English from the European Patent Office.

This is our latest selection of worldwide publications and patents in english on Encryption, between many scientific online journals, classified and focused on encryption, cryptography, cipher, AES, cryptanalysis, Diffie-Hellman, hash function, RSA algorithm, digital signature, cryptographic key, certificate authority, public key, private key and elliptic curve.

The Response of Alpine Permafrost to Decadal Human Disturbance in the Context of Climate Warming

Published on 2025-10-19 by Shuping Zhang, Ji Chen, Lijun Huo, Xinyang Li, Chengying Wu, Hucai Zhang, Qi Feng @MDPI

Abstract: Alpine permafrost plays a vital role in regional hydrology and ecology. Alpine permafrost is highly sensitive to climate change and human disturbance. The Muri area, which is located in the headwaters of the Datong River, northeast of the Tibetan Plateau, has undergone decadal mining, and the permafrost stability there has attracted substantial concerns. In order to decipher how and to what extent the permafrost in the Muri area has responded to the decadal mining in the context of climate chang[...]


Our summary: The study analyzes the response of alpine permafrost in the Muri area to decadal mining and climate change. It utilizes downscaled MODIS land surface temperatures to estimate active layer thickness with high accuracy. Findings indicate that human disturbance has increased active layer thickness without significant spatial expansion.

Permafrost, Climate Change, Human Disturbance, Land Surface Temperature

Publication

A Landsat NDVI Buffer-Gradient Approach for Sustainable Rail Infrastructure

Published on 2025-10-19 by Balgyn Ashimova, Raikhan Beisenova, Ignacio Menéndez-Pidal @MDPI

Abstract: The development of railway infrastructure is considered a key driver of vegetation cover transformation, particularly in ecologically sensitive regions. This study aims to quantify the spatio-temporal impact of the Presnogorkovskaya–Zhanaesil railway corridor in Northern Kazakhstan over the period 1985–2024. Using Landsat imagery and a gradient method of comparative analysis with a control area, an innovative coefficient B was developed to assess changes across variou[...]


Our summary: This study quantifies the impact of the Presnogorkovskaya–Zhanaesil railway on vegetation in Northern Kazakhstan from 1985 to 2024. It employs Landsat imagery and a gradient analysis method to develop a new coefficient for assessing vegetation changes. The findings reveal significant degradation near the railway, influenced by both anthropogenic factors and environmental gradients.

Landsat, NDVI, railway infrastructure, vegetation change

Publication

A Blockchain-Based Medical Insurance Transaction System

Published on 2025-10-17 by Jun Fei, Li Ling @MDPI

Abstract: The Blockchain-Based Medical Insurance Transaction System (BMIT) developed in this study addresses key issues in traditional medical insurance—information silos, data tampering, and privacy breaches—through innovative blockchain architectural design and technical infrastructure reconstruction. Built on a consortium blockchain architecture with FISCO BCOS (Financial Blockchain Shenzhen Consortium Blockchain Open Source Platform) as the underlying platform, the system l[...]


Our summary: The Blockchain-Based Medical Insurance Transaction System (BMIT) utilizes a consortium blockchain architecture to enhance data security and privacy in medical insurance. It features a unique 3D-enhanced Bloom filter for efficient data storage and access control. Performance tests demonstrate its capability to handle 736 TPS with low latency, making it suitable for large-scale applications.

Blockchain, Medical Insurance, Data Privacy, Smart Contracts

Publication

Secure Chaotic Cryptosystem for 3D Medical Images

Published on 2025-10-16 by Antonios S. Andreatos, Apostolos P. Leros @MDPI

Abstract: This study proposes a lightweight double-encryption cryptosystem for 3D medical images such as Magnetic Resonance Imaging (MRI), Positron Emission Tomography (PET) scans, and Computed Tomography scans (CT). The first encryption process uses chaotic pseudo-random numbers produced by a Lorenz chaotic system while the second applies Cipher Block Chaining (CBC) mode using outputs from a Pseudo-Random Number Generator (PRNG). To enhance diffusion and confusion, additional voxel shuffling and bit rota[...]


Our summary: This study presents a lightweight double-encryption cryptosystem for 3D medical images. It utilizes chaotic pseudo-random numbers and Cipher Block Chaining for enhanced security. The cryptosystem demonstrates strong performance metrics, ensuring confidentiality and resilience against threats.

Chaotic Cryptosystem, Double-Encryption, Medical Imaging, Security

Publication

Integrity and data encryption (ide) shared across multiple interconnect controllers

Patent published on the 2025-10-16 in WO under Ref WO2025217333 by RAMBUS INC [US] (Kapoor Ajay [us], Liao Yu Cheng [us], Ternullo Luigi [us])

Abstract: Technologies directed to integrity and data encryption (IDE) shared across multiple interconnect controllers are described. A device includes multiple interconnect controllers and a single IDE circuit coupled with the multiple interconnect controllers. The single IDE circuit includes arbitration logic to enable concurrent support of the multiple interconnect controllers with a reconfigurable bandwidth allocation.[...]


Our summary: The content discusses technologies for integrity and data encryption shared among multiple interconnect controllers. It describes a device featuring multiple interconnect controllers connected to a single IDE circuit. The IDE circuit includes arbitration logic for concurrent support and reconfigurable bandwidth allocation.

Integrity, data encryption, interconnect controllers, arbitration logic

Patent

An AI-Enhanced Blockchain Consensus Framework for Autonomous Regulatory Compliance

Published on 2025-10-15 by Sejin Han @MDPI

Abstract: Following the stablecoin legislation (GENIUS Act) enacted under the second Trump administration in 2025, blockchain has become core digital economy infrastructure. However, privacy risks from decentralization and transparency constrain adoption in regulated industries, requiring solutions that harmonize blockchain architecture with regulatory compliance. Existing research relies on reactive auditing or post-execution rule checking, which wastes computational resources or provides only basic encr[...]


Our summary: The AIRPoC framework enhances blockchain with AI for autonomous regulatory compliance. It features a dual-layer architecture that validates regulations before consensus execution. Experimental results show high compliance accuracy and efficient transaction processing.

AI, Blockchain, Regulatory Compliance, Consensus Framework

Publication

Hybrid Receptor-Mediated Molecular Delineations in TNF-α and IGF-1-Induced Costimulatory Effects

Published on 2025-10-15 by Chandra S. Boosani, Pradeep N. Subramanyam, Gopal P. Jadhav @MDPI

Abstract: The growth-promoting roles of IGF-1 (Insulin-like Growth Factor 1) and the inflammation-modulating cytokine TNF-α (Tumor Necrosis Factor-alpha) have been substantially deciphered in various pathological conditions. Also, their biphasic roles in modulating cellular inflammation have been reported. While their independent signaling pathways are sufficiently explored, recent studies have identified that their combined or costimulatory effects uniquely contribute to the regulation of d[...]


Our summary: This study investigates the costimulatory effects of TNF-alpha and IGF-1 on SOCS3 expression. It reveals that hybrid receptors formed by TNFR1 and IGF1R may inhibit SOCS3 expression. The findings suggest a negative feedback mechanism involving SOCS3 that regulates inflammatory signaling.

Hybrid receptors, TNF-alpha, IGF-1, SOCS3

Publication

A computer hardware encryption device

Patent published on the 2025-10-06 in LU under Ref LU600475 by ZHEJIANG COLLEGE OF SECURITY TECH [CN] (Zhang Li [cn])

Abstract: The invention discloses a computer hardware encryption device, which relates to the technical field of computer security, comprising a chassis, the side of the chassis is hinged and equipped with a box door, and the interior of the chassis is also equipped with a control module and computer hardware; The operation screen is arranged on the side of the box door for entering the unlock password and fingerprint recognition; The camera is set on the side of the box door for face recognition; The ope[...]


Our summary: The invention describes a computer hardware encryption device designed for enhanced security. It features a chassis with a hinged box door, control module, and biometric systems for user authentication. The device effectively isolates and protects computer hardware from unauthorized access and external connections.

encryption, computer security, hardware protection, biometric authentication

Patent

Table of Contents
    Add a header to begin generating the table of contents

    AVAILABLE FOR NEW CHALLENGES
    Mechanical Engineer, Project, Process Engineering or R&D Manager
    Effective product development

    Available for a new challenge on short notice.
    Contact me on LinkedIn
    Plastic metal electronics integration, Design-to-cost, GMP, Ergonomics, Medium to high-volume devices & consumables, Lean Manufacturing, Regulated industries, CE & FDA, CAD, Solidworks, Lean Sigma Black Belt, medical ISO 13485

    We are looking for a new sponsor

     

    Your company or institution is into technique, science or research ?
    > send us a message <

    Topics covered: encryption, cryptography, cipher, AES, cryptanalysis, Diffie-Hellman, hash function, RSA algorithm, digital signature, cryptographic key, certificate authority, public key, private key, elliptic curve, dynamic encryption, secure offline transactions, wireless LAN, and encryption protocol..

    Historical Context

    1964
    1970
    1970
    1974-11-15
    1980
    1980
    1984
    1963
    1968
    1970
    1970
    1980
    1980
    1980
    1984

    (if date is unknown or not relevant, e.g. "fluid mechanics", a rounded estimation of its notable emergence is provided)

    Scroll to Top

    You May Also Like