2014
DOI: 10.1080/09720529.2014.952520
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Scheme for Joint Compression and Encryption

Abstract: The scheme about compression and encryption is widely used in network traff ic to improve system eff iciency and security. In this paper, we put forward a scheme to demonstrate an optimal implementation on them. We prove that the hardware accelerators and its corresponding latency can be cut in half. If such do not exist, we further propose a novel and more aggressive software scheme, in which encryption is integrated into the compression algorithm. The integrated optimization scheme achieves an average speedu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…The authors in [104] performed an analysis on some traditional and modern hybrid encryption techniques with post-quantum methods, such as DES-RSA [105] , 3D chaotic map techniques [106], RSA-based singular cubic curves, RSA based on ECC with AVK [107], Joint Compression and Encryption (JCE) [108] and Blowfish [109]. These encryption techniques and algorithms were compared on the basis of various performance metrics such as execution time, bit sizes, key length, possible keys and level of security.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [104] performed an analysis on some traditional and modern hybrid encryption techniques with post-quantum methods, such as DES-RSA [105] , 3D chaotic map techniques [106], RSA-based singular cubic curves, RSA based on ECC with AVK [107], Joint Compression and Encryption (JCE) [108] and Blowfish [109]. These encryption techniques and algorithms were compared on the basis of various performance metrics such as execution time, bit sizes, key length, possible keys and level of security.…”
Section: Related Workmentioning
confidence: 99%