Results 31 to 40 of about 41,294 (296)
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies.
Basel Halak +2 more
doaj +1 more source
Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks [PDF]
Background With the extensive application and continuous expansion of the Internet of Things (IoT), the access of a large number of resource-limited nodes makes the IoT application face a variety of security vulnerabilities and efficiency limitations ...
Zhongya Liu, Yunxiao Luo
doaj +2 more sources
E-commerce security has recently been an emerging topic due to the escalation in credit card fraud and stolen user accounts. In general, the security bridge and privacy leakage occur on the side of e-commerce companies due to various factors such as ...
Sena Efsun Cebeci +2 more
doaj +1 more source
RK algorithm: stochastic parallel methodology for symmetric key cryptography [PDF]
With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network researchers. In thisperspective many possible fields of endeavour come to mind with many cryptographic algorithms in a broader way,each is highly worthy and ...
Yegireddi Ramesh, Kiran Kumar Reddi
openaire +1 more source
Optimized Implementation and Analysis of CHAM in Quantum Computing
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang +3 more
doaj +1 more source
Quantum key distribution rates from non-symmetric conic optimization [PDF]
Computing key rates in quantum key distribution (QKD) numerically is essential to unlock more powerful protocols, that use more sophisticated measurement bases or quantum systems of higher dimension.
Andrés González Lorente +3 more
doaj +1 more source
A computational enhancement of Base64 algorithm using Residue Number System algorithms [PDF]
Today's daily existence depends heavily on the advancement of data, information and communication technologies. Consequently, there is a huge increase in the need for data and information.
Kolawole Bariu LOGUNLEKO +4 more
doaj +1 more source
A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally
Koketso Ntshabele +3 more
doaj +1 more source
Public key based key distribution scheme for wireless sensor networks
Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public ...
HUANG Jie1, HUANG Bei1
doaj +2 more sources
Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)
Ciphers can be either symmetric-key or public-key. Symmetric-key ciphers are the most famous and important elements in many cryptographic systems. Individually, they provide confidentiality and privacy.
Hana Rashied Ismaeel
doaj +1 more source

