Results 1 to 10 of about 46,480 (118)

Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography

open access: yesEntropy, 2020
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, Charles Ci Wen Lim
doaj   +3 more sources

09031 Abstracts Collection -- Symmetric Cryptography [PDF]

open access: yes, 2009
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena   +3 more
core   +4 more sources

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

LORENA: Low memORy symmEtric-Key geNerAtion Method for Based on Group Cryptography Protocol Applied to the Internet of Healthcare Things

open access: yesIEEE Access, 2022
The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT specialization handling sensitive user data and ...
Kristtopher Kayo Coelho   +5 more
doaj   +1 more source

Proposal to Generate a Various Key from Image for Various Encryption Methods [PDF]

open access: yesEngineering and Technology Journal, 2013
There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages.
Shatha Habeeb, Eman Shakeer
doaj   +1 more source

Transitory Master Key Transport Layer Security for WSNs

open access: yesIEEE Access, 2020
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti   +2 more
doaj   +1 more source

Survey on Modern Cryptography

open access: yesJournal of Kufa for Mathematics and Computer, 2021
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from ...
Mustafa Abd Zaid, Soukaena Hassan
doaj   +1 more source

IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2022
The object of the study is the processes of building groups of symmetric double-operand operations of cryptographic coding of information. The subject of the study are features of the implementation of a generalized method of synthesis groups of ...
Nataliia Lada, Yuliia Rudnytska
doaj   +1 more source

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection

open access: yesEmitter: International Journal of Engineering Technology, 2020
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members.
Anindya Dwi Putri Islamidina   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy