Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation
暂无分享,去创建一个
[1] I. Vukusic,et al. On sums of two Fibonacci numbers that are powers of numbers with limited Hamming weight , 2023, 2302.08303.
[2] N. Murru,et al. Zeckendorf representation of multiplicative inverses modulo a Fibonacci number , 2022, Monatshefte für Mathematik.
[3] Zhide Li,et al. Enhancing the Anti-Cryptanalysis Ability and Avalanche Effect with Zeckendorf Representation via FPGA Implementation , 2021, 2021 4th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE).
[4] Weijie Chen,et al. Security vulnerability and encryption technology of computer information technology data under big data environment , 2021 .
[5] Basirudin Djamaluddin,et al. End to End Data Security Challenges in Real-Time Drilling Data Environment - From Data Transfer to Analytics , 2020 .
[6] Y. Bugeaud. On the Zeckendorf Representation of Smooth Numbers , 2019, Moscow Mathematical Journal.
[7] Fei Tan,et al. A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks , 2019, Nonlinear Dynamics.
[8] Seyedehzahra Hosseini,et al. Fingerprint vulnerability: A survey , 2018, 2018 4th International Conference on Web Research (ICWR).
[9] Dawei Wang,et al. A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .
[10] Lin Zhiqiang,et al. The Transformation from the Galois NLFSR to the Fibonacci Configuration , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.
[11] Elena Dubrova,et al. An Improved Hardware Implementation of the Quark Hash Function , 2013, RFIDSec.
[12] G. A. Vijayalakshmi Pai,et al. Stream cipher for binary image encryption using Ant Colony Optimization based key generation , 2012, Appl. Soft Comput..
[13] Thierry P. Berger,et al. Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode , 2009, INDOCRYPT.
[14] Jungkyu Han,et al. An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices , 2007, SAC '07.
[15] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[16] Toufik Mansour,et al. Combinatorial Identities and Inverse Binomial Coefficients , 2002, Adv. Appl. Math..
[17] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[18] Tomasz Idziaszek,et al. Efficient Algorithm for Multiplication of Numbers in Zeckendorf Representation , 2021, FUN.
[19] Anne Strauss,et al. Elementary Number Theory And Its Applications , 2016 .
[20] C. G. Lekkerkerker,et al. Voorstelling van natuurlijke getallen door een som van getallen van fibonacci , 1951 .