Results 21 to 30 of about 39,218 (293)

QKD Based on Symmetric Entangled Bernstein-Vazirani

open access: yesEntropy, 2021
This paper introduces a novel entanglement-based QKD protocol, that makes use of a modified symmetric version of the Bernstein-Vazirani algorithm, in order to achieve secure and efficient key distribution.
Michael Ampatzis, Theodore Andronikos
doaj   +1 more source

3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based

open access: yesIEEE Access, 2020
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj   +1 more source

A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre

open access: yesCybernetics and Information Technologies, 2023
In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key.
Cherukuri Aswani Kumar   +9 more
doaj   +1 more source

Secure key-sharing algorithm based on smart grid

open access: yes网络与信息安全学报, 2021
Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue. Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the ...
GU Wei, REN Yongjun, SHEN Jian
doaj   +3 more sources

A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module

open access: yesSensors, 2021
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we ...
Kyeeun Kim   +7 more
doaj   +1 more source

Design of Secure Chatting Application with End to End Encryption for Android Platform

open access: yesIraqi Journal for Computers and Informatics, 2017
In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques.
Ammar Ali, Ali Sagheer
doaj   +3 more sources

FCNN Model for Diagnosis and Analysis of Symmetric Key Cryptosystem

open access: yesIraqi Journal for Computer Science and Mathematics, 2022
An important part of a cryptosystem is a cryptographic algorithm, which protects unauthorized attackers from obtaining private and sensitive data. This study is a research project on identifying cryptographic algorithms using deep learning techniques ...
Ali H. Alwan, Ali. H. Kashmar
doaj   +1 more source

An improved NFC device authentication protocol.

open access: yesPLoS ONE, 2021
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj   +1 more source

Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2019
In cryptography, we know the symmetric key algorithms and asymmetric key algorithms. We know that the asymmetric key algorithm is more secure than the symmetric key algorithm. Affine Cipher uses a symmetric key algorithm.
Maxrizal Maxrizal   +1 more
doaj   +1 more source

Enhanced RC5 Algorithm using Parallel Computing for Communication Networks

open access: yesIngeniería y Ciencia, 2019
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length.
David Fabián Cevallos Salas
doaj   +1 more source

Home - About - Disclaimer - Privacy