Results 101 to 110 of about 23,331 (249)

A new security architecture for SIP based P2P computer networks [PDF]

open access: yes, 2008
Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e.
Tang, S, Yip, YJ, Yongfeng, H
core  

Privacy-Preserving Set Intersection Protocol Based on SM2 Oblivious Transfer

open access: yesComputers
Private Set Intersection (PSI) is a fundamental cryptographic primitive in privacy-preserving computation and has been widely applied in federated learning, secure data sharing, and privacy-aware data analytics.
Zhibo Guan   +7 more
doaj   +1 more source

A Novel DNA Techniques to Strengthen Cryptographic Permutation Tables in Encryption Algorithm

open access: yesIEEE Access
Cryptography has long safeguarded sensitive data within information security. Recently, integrating traditional cryptographic methods with Deoxyribonucleic Acid (DNA) technologies sparked interest, giving rise to DNA cryptography.
Nik Azura Nik Abdullah   +4 more
doaj   +1 more source

Efficient Length Doubling From Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length [n..2n − 1].
Yu Long Chen   +3 more
doaj   +1 more source

On some quasigroup cryptographical primitives

open access: yesCoRR, 2011
11 ...
Piroska Csörgö, Victor A. Shcherbacov
openaire   +2 more sources

Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks

open access: yesSensors, 2019
Today, medical equipment or general-purpose devices such as smart-watches or smart-textiles can acquire a person’s vital signs. Regardless of the type of device and its purpose, they are all equipped with one or more sensors and often have wireless
Carmen Camara   +3 more
doaj   +1 more source

THE DYNAMIC CIPHERS – NEW CONCEPT OF LONG-TERM CONTENT PROTECTING [PDF]

open access: yes
In the paper the original concept of a new cipher, targeted at this moment forcivil applications in technology (e.g. measurement and control systems) and business (e.g.content protecting, knowledge-based companies or long-term archiving systems) is ...
Grzegorz Szewczyk
core  

On the composable security of weak coin flipping [PDF]

open access: yesQuantum
Weak coin flipping is a cryptographic primitive in which two mutually distrustful parties generate a shared random bit to agree on a winner via remote communication. While a stand-alone secure weak coin flipping protocol can be constructed from noiseless
Jiawei Wu   +3 more
doaj   +1 more source

A European Call for Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation [PDF]

open access: bronze, 2007
Joos Vandewalle   +5 more
openalex   +1 more source

MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY

open access: yesÌнформаційні технології в освіті, 2010
The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The
A. Beletsky, D. Stecenko
doaj  

Home - About - Disclaimer - Privacy