Results 21 to 30 of about 383,874 (285)
Round key formation algorithm for symmetric block encryption algorithms [PDF]
In this work, an algorithm for generating round keys of any length for symmetric block encryption algorithms was developed. The degree of randomness of the sequences generated using the key and initialization vector was evaluated.
Umarovich Jurayev Gayrat +2 more
doaj +1 more source
Secure File Storage On Cloud Using Hybrid Cryptography
As technology today is moving forward exponentially, data exchange over the Internet has become a daily routine. Furthermore, businesses are growing internationally and offices are being established in a variety of different places throughout the world.
Jian-Foo Lai, Swee-Huay Heng
doaj +1 more source
E-commerce security has recently been an emerging topic due to the escalation in credit card fraud and stolen user accounts. In general, the security bridge and privacy leakage occur on the side of e-commerce companies due to various factors such as ...
Sena Efsun Cebeci +2 more
doaj +1 more source
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies.
Basel Halak +2 more
doaj +1 more source
Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks [PDF]
Background With the extensive application and continuous expansion of the Internet of Things (IoT), the access of a large number of resource-limited nodes makes the IoT application face a variety of security vulnerabilities and efficiency limitations ...
Zhongya Liu, Yunxiao Luo
doaj +2 more sources
Optimized Implementation and Analysis of CHAM in Quantum Computing
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang +3 more
doaj +1 more source
Content Based Symmetric Key Algorithm
AbstractWith the growth in technology, there is always a need of good encryption method which may provide better security and authenticity with lesser computational complexities. Although there are a lot of symmetric key algorithms which are already been proposed, yet we are going to propose a content based symmetric key algorithm.
Shrivastava, Manish +2 more
openaire +1 more source
Sampling diffusive transition paths [PDF]
We address the problem of sampling double-ended diffusive paths. The ensemble of paths is expressed using a symmetric version of the Onsager-Machlup formula, which only requires evaluation of the force field and which, upon direct time discretization ...
Miller III, Thomas F. +1 more
core +2 more sources
The problem of data security is essential because data must be maintained securely and in its integrity, starting with the sending procedure and ending with the intended recipient.
Julia Kurniasih, Dian Tiara Rezalti
doaj +1 more source
A fast parallel algorithm for special linear systems of equations using processor arrays with reconfigurable bus systems [PDF]
A parallel algorithm using Processor Arrays with Reconfigurable Bus Systems has been designed to solve dense Symmetric Positive Definite (SPD) systems of equations Ax = b. The key content of this report is the parallelisation of the algorithm by Delosme &
Chaudhari, N. S. +2 more
core +1 more source

