Results 1 to 10 of about 39,218 (293)

Using Simon's algorithm to attack symmetric-key cryptographic primitives [PDF]

open access: greenQuantum Information and Computation, 2017
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon’s algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery ...
Thomas Santoli, Christian Schaffner
openalex   +6 more sources

A Symmetric Key Cryptographic Algorithm [PDF]

open access: bronzeInternational Journal of Computer Applications, 2010
Ms Ayushi
openalex   +2 more sources

RETRACTED: The Application of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

open access: goldPhysics Procedia, 2012
This article has been retracted: please see Elsevier Policy on Article Withdrawal (http://www.elsevier.com/locate/withdrawalpolicy).This article has been retracted at the request of the Publisher.The authors have plagiarized a paper that had already appeared in “Queen's 25th Biennial Symposium on Communications”, page 168-172, print ISBN 978-1-4244 ...
Lingling Si, Zhigang Ji, Zhihui Wang
openalex   +3 more sources

A Symmetric Key Based Steganography Algorithm for Secured Data Transfer [PDF]

open access: bronzeIOSR Journal of Engineering, 2012
Steganography is the art of hiding information efficiently into another media. It serves as a better way of securing message than cryptography which only conceals the content of the information. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable.
Sandipan Debnath
openalex   +2 more sources

Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification [PDF]

open access: yesPeerJ Computer Science
Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks.
Jiakai Hao   +3 more
doaj   +3 more sources

An Alphanumeric Symmetric Key Cryptography Algorithm for Fast and Secure Enciphering [PDF]

open access: bronzeInternational Journal of Computer Applications, 2017
Suraj Verma, Ashish Agrawal
openalex   +2 more sources

Statistical cryptanalyses of symmetric-key algorithms.

open access: bronze, 2010
This document is essentially presenting results on statistical cryptanalyses of iterative block ciphers. Nevertheless, some results may be applied to other situations like stream cipher cryptanalysis or side channel attacks, ... After a short recall of the basics required for the understanding of the document, we focus on the two main families of ...
Benoît Gérard
openalex   +3 more sources

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Anti-attacks encryption algorithm based on DNA computing and data encryption standard

open access: yesAlexandria Engineering Journal, 2022
Data Encryption Standard (DES) is the first 56-bits secret-key standard that is widely used as a symmetric-key 64-bits block encryption/decryption algorithm. Unfortunately, the rapid increase in computing power makes it possible to find the required bits
Tarek Hagras   +2 more
doaj   +1 more source

PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices [PDF]

open access: yesSensors, 2019
With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data. Strong but efficient cryptography solutions must be employed to deal with this problem, along with methods to standardize secure communications between these devices.
Saraiva, Daniel   +5 more
openaire   +6 more sources

Home - About - Disclaimer - Privacy