Results 1 to 10 of about 3,519 (307)

A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]

open access: yesSensors
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li   +4 more
doaj   +2 more sources

Symmetric Cryptography (Dagstuhl Seminar 22141)

open access: green, 2022
Contains fulltext : 286012.pdf (Publisher’s version ) (Open Access)
Nils Gregor Leander   +4 more
openalex   +4 more sources

Symmetric cryptography

open access: gold
Contains fulltext : 310914.pdf (Publisher’s version ) (Open Access)
Seán Murphy, Rachel Player
  +6 more sources

Cryptography: Symmetric Vs Asymmetric Encryption

open access: green, 2018
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet.
Anurag Rawal   +3 more
openalex   +3 more sources

Symmetric Cryptography (Dagstuhl Seminar 16021)

open access: green, 2016
From 10.01.2016 to 15.01.2016, the Seminar 16021 in Symmetric Cryptography was held in Schloss Dagstuhl-Leibniz Center for Informatics. It was the fifth in the series of the Dagstuhl seminars "Symmetric Cryptography" held in 2007, 2009, 2012, and 2014. During the seminar, several participants presented their current research, and ongoing work and open
Frederik Armknecht   +3 more
openalex   +4 more sources

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

LORENA: Low memORy symmEtric-Key geNerAtion Method for Based on Group Cryptography Protocol Applied to the Internet of Healthcare Things

open access: yesIEEE Access, 2022
The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT specialization handling sensitive user data and ...
Kristtopher Kayo Coelho   +5 more
doaj   +1 more source

Proposal to Generate a Various Key from Image for Various Encryption Methods [PDF]

open access: yesEngineering and Technology Journal, 2013
There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages.
Shatha Habeeb, Eman Shakeer
doaj   +1 more source

Transitory Master Key Transport Layer Security for WSNs

open access: yesIEEE Access, 2020
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti   +2 more
doaj   +1 more source

Survey on Modern Cryptography

open access: yesJournal of Kufa for Mathematics and Computer, 2021
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from ...
Mustafa Abd Zaid, Soukaena Hassan
doaj   +1 more source

Home - About - Disclaimer - Privacy