Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation

[1]  I. Vukusic,et al.  On sums of two Fibonacci numbers that are powers of numbers with limited Hamming weight , 2023, 2302.08303.

[2]  N. Murru,et al.  Zeckendorf representation of multiplicative inverses modulo a Fibonacci number , 2022, Monatshefte für Mathematik.

[3]  Zhide Li,et al.  Enhancing the Anti-Cryptanalysis Ability and Avalanche Effect with Zeckendorf Representation via FPGA Implementation , 2021, 2021 4th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE).

[4]  Weijie Chen,et al.  Security vulnerability and encryption technology of computer information technology data under big data environment , 2021 .

[5]  Basirudin Djamaluddin,et al.  End to End Data Security Challenges in Real-Time Drilling Data Environment - From Data Transfer to Analytics , 2020 .

[6]  Y. Bugeaud On the Zeckendorf Representation of Smooth Numbers , 2019, Moscow Mathematical Journal.

[7]  Fei Tan,et al.  A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks , 2019, Nonlinear Dynamics.

[8]  Seyedehzahra Hosseini,et al.  Fingerprint vulnerability: A survey , 2018, 2018 4th International Conference on Web Research (ICWR).

[9]  Dawei Wang,et al.  A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .

[10]  Lin Zhiqiang,et al.  The Transformation from the Galois NLFSR to the Fibonacci Configuration , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.

[11]  Elena Dubrova,et al.  An Improved Hardware Implementation of the Quark Hash Function , 2013, RFIDSec.

[12]  G. A. Vijayalakshmi Pai,et al.  Stream cipher for binary image encryption using Ant Colony Optimization based key generation , 2012, Appl. Soft Comput..

[13]  Thierry P. Berger,et al.  Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode , 2009, INDOCRYPT.

[14]  Jungkyu Han,et al.  An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices , 2007, SAC '07.

[15]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[16]  Toufik Mansour,et al.  Combinatorial Identities and Inverse Binomial Coefficients , 2002, Adv. Appl. Math..

[17]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[18]  Tomasz Idziaszek,et al.  Efficient Algorithm for Multiplication of Numbers in Zeckendorf Representation , 2021, FUN.

[19]  Anne Strauss,et al.  Elementary Number Theory And Its Applications , 2016 .

[20]  C. G. Lekkerkerker,et al.  Voorstelling van natuurlijke getallen door een som van getallen van fibonacci , 1951 .