Results 11 to 20 of about 383,874 (285)

Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives [PDF]

open access: yesQuantum Information and Computation, 2017
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives ...
Santoli, Thomas, Schaffner, Christian
core   +5 more sources

Classical and physical security of symmetric key cryptographic algorithms [PDF]

open access: yes2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Attack.
openaire   +2 more sources

A Comparative Study of Symmetric Key Algorithms

open access: yesInternational Journal of Computer Science and Mobile Computing, 2023
Security is the prime issue while transferring information across a network. Therefore, the concept of encryption and decryption of information was introduced. Cryptography is a technique of converting plain information into encrypted text. This is done so that only legitimate users can access the data being sent.
Dipu Jo George, Tony Thomas
openaire   +1 more source

PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices [PDF]

open access: yesSensors, 2019
With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data. Strong but efficient cryptography solutions must be employed to deal with this problem, along with methods to standardize secure communications between these devices.
Saraiva, Daniel   +5 more
openaire   +5 more sources

FCNN Model for Diagnosis and Analysis of Symmetric Key Cryptosystem

open access: yesIraqi Journal for Computer Science and Mathematics, 2022
An important part of a cryptosystem is a cryptographic algorithm, which protects unauthorized attackers from obtaining private and sensitive data. This study is a research project on identifying cryptographic algorithms using deep learning techniques ...
Ali H. Alwan, Ali. H. Kashmar
doaj   +1 more source

Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2019
In cryptography, we know the symmetric key algorithms and asymmetric key algorithms. We know that the asymmetric key algorithm is more secure than the symmetric key algorithm. Affine Cipher uses a symmetric key algorithm.
Maxrizal Maxrizal   +1 more
doaj   +1 more source

An improved NFC device authentication protocol.

open access: yesPLoS ONE, 2021
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj   +1 more source

Enhanced RC5 Algorithm using Parallel Computing for Communication Networks

open access: yesIngeniería y Ciencia, 2019
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length.
David Fabián Cevallos Salas
doaj   +1 more source

Symmetric Key Cryptography Algorithm for Data Security [PDF]

open access: yesInternational Journal of Trend in Scientific Research and Development, 2018
Ambiguous Multi Symmetric Cryptography AMSC that hide multiple plain texts in a cipher text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed. The proposed method AMSC is a cryptographic primitive that preserves plausible deniability after a cryptographic ...
Tushar Anil Patil   +1 more
openaire   +1 more source

Simpler and Better Algorithms for Minimum-Norm Load Balancing [PDF]

open access: yes, 2019
Recently, Chakrabarty and Swamy (STOC 2019) introduced the minimum-norm load-balancing problem on unrelated machines, wherein we are given a set J of jobs that need to be scheduled on a set of m unrelated machines, and a monotone, symmetric norm; We seek
Chakrabarty, Deeparnab, Swamy, Chaitanya
core   +2 more sources

Home - About - Disclaimer - Privacy