Results 31 to 40 of about 383,874 (285)

Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 [PDF]

open access: yes, 2013
International audienceWhile the symmetric-key cryptography community has now a good experience on how to build a secure and efficient fixed permutation, it remains an open problem how to design a key-schedule for block ciphers, as shown by the numerous ...
Fouque, Pierre-Alain   +2 more
core   +7 more sources

Quantum key distribution rates from non-symmetric conic optimization [PDF]

open access: yesQuantum
Computing key rates in quantum key distribution (QKD) numerically is essential to unlock more powerful protocols, that use more sophisticated measurement bases or quantum systems of higher dimension.
Andrés González Lorente   +3 more
doaj   +1 more source

RK algorithm: stochastic parallel methodology for symmetric key cryptography [PDF]

open access: yesAPTIKOM Journal on Computer Science and Information Technologies, 2017
With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network researchers. In thisperspective many possible fields of endeavour come to mind with many cryptographic algorithms in a broader way,each is highly worthy and ...
Yegireddi Ramesh, Kiran Kumar Reddi
openaire   +1 more source

An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14-Rounds [PDF]

open access: yes, 2017
Cryptography methods are widely use in digital communication for secure data transaction. Cryptography methods have two categories symmetric and asymmetric. Both types of encrypting have their own importance and limitations.
Lilhore, U. K. (Umesh)   +1 more
core   +1 more source

Practical Schemes For Privacy & Security Enhanced RFID

open access: yes, 2009
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive,
Hoepman, J.H., Joosten, R., Samarati, P.
core   +5 more sources

A computational enhancement of Base64 algorithm using Residue Number System algorithms [PDF]

open access: yesRevista Română de Informatică și Automatică
Today's daily existence depends heavily on the advancement of data, information and communication technologies. Consequently, there is a huge increase in the need for data and information.
Kolawole Bariu LOGUNLEKO   +4 more
doaj   +1 more source

Interference Alignment for Partially Connected MIMO Cellular Networks

open access: yes, 2012
In this paper, we propose an iterative interference alignment (IA) algorithm for MIMO cellular networks with partial connectivity, which is induced by heterogeneous path losses and spatial correlation. Such systems impose several key technical challenges
Lau, Vincent Kin Nang   +2 more
core   +2 more sources

A Satisfiability Algorithm for Sparse Depth Two Threshold Circuits [PDF]

open access: yes, 2013
We give a nontrivial algorithm for the satisfiability problem for cn-wire threshold circuits of depth two which is better than exhaustive search by a factor 2^{sn} where s= 1/c^{O(c^2)}.
Impagliazzo, Russell   +2 more
core   +1 more source

Public key based key distribution scheme for wireless sensor networks

open access: yesTongxin xuebao, 2011
Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public ...
HUANG Jie1, HUANG Bei1
doaj   +2 more sources

A Secret Key Classification Framework of Symmetric Encryption Algorithm Based on Deep Transfer Learning

open access: yesApplied Sciences, 2023
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities.
Xiaotong Cui   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy