Results 21 to 30 of about 383,874 (285)

Round key formation algorithm for symmetric block encryption algorithms [PDF]

open access: yesE3S Web of Conferences
In this work, an algorithm for generating round keys of any length for symmetric block encryption algorithms was developed. The degree of randomness of the sequences generated using the key and initialization vector was evaluated.
Umarovich Jurayev Gayrat   +2 more
doaj   +1 more source

Secure File Storage On Cloud Using Hybrid Cryptography

open access: yesJournal of Informatics and Web Engineering, 2022
As technology today is moving forward exponentially, data exchange over the Internet has become a daily routine. Furthermore, businesses are growing internationally and offices are being established in a variety of different places throughout the world.
Jian-Foo Lai, Swee-Huay Heng
doaj   +1 more source

Secure E-Commerce Scheme

open access: yesIEEE Access, 2022
E-commerce security has recently been an emerging topic due to the escalation in credit card fraud and stolen user accounts. In general, the security bridge and privacy leakage occur on the side of e-commerce companies due to various factors such as ...
Sena Efsun Cebeci   +2 more
doaj   +1 more source

Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications

open access: yesIEEE Access, 2022
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies.
Basel Halak   +2 more
doaj   +1 more source

Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks [PDF]

open access: yesPeerJ Computer Science, 2023
Background With the extensive application and continuous expansion of the Internet of Things (IoT), the access of a large number of resource-limited nodes makes the IoT application face a variety of security vulnerabilities and efficiency limitations ...
Zhongya Liu, Yunxiao Luo
doaj   +2 more sources

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

Content Based Symmetric Key Algorithm

open access: yesProcedia Computer Science, 2016
AbstractWith the growth in technology, there is always a need of good encryption method which may provide better security and authenticity with lesser computational complexities. Although there are a lot of symmetric key algorithms which are already been proposed, yet we are going to propose a content based symmetric key algorithm.
Shrivastava, Manish   +2 more
openaire   +1 more source

Sampling diffusive transition paths [PDF]

open access: yes, 2006
We address the problem of sampling double-ended diffusive paths. The ensemble of paths is expressed using a symmetric version of the Onsager-Machlup formula, which only requires evaluation of the force field and which, upon direct time discretization ...
Miller III, Thomas F.   +1 more
core   +2 more sources

Text Encryption Analysis of Modified Symmetric Keys using Genetic Algorithm on Caesar Cipher and One Time Pad

open access: yesIJIE (Indonesian Journal of Informatics Education), 2022
The problem of data security is essential because data must be maintained securely and in its integrity, starting with the sending procedure and ending with the intended recipient.
Julia Kurniasih, Dian Tiara Rezalti
doaj   +1 more source

A fast parallel algorithm for special linear systems of equations using processor arrays with reconfigurable bus systems [PDF]

open access: yes, 1999
A parallel algorithm using Processor Arrays with Reconfigurable Bus Systems has been designed to solve dense Symmetric Positive Definite (SPD) systems of equations Ax = b. The key content of this report is the parallelisation of the algorithm by Delosme &
Chaudhari, N. S.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy