Results 1 to 10 of about 807,165 (362)

Symmetric Cryptography 2 [PDF]

open access: green, 2023
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions.The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components ...
Christina Boura, María Naya‐Plasencia
semanticscholar   +5 more sources

LORENA: Low memORy symmEtric-Key geNerAtion Method for Based on Group Cryptography Protocol Applied to the Internet of Healthcare Things

open access: yesIEEE Access, 2022
The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT specialization handling sensitive user data and ...
Kristtopher Kayo Coelho   +5 more
doaj   +2 more sources

Architectural support for fast symmetric-key cryptography [PDF]

open access: greenProceedings of the ninth international conference on Architectural support for programming languages and operating systems, 2000
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides the mechanisms necessary to implement accountability, accuracy, and confidentiality in communication.
Jerome Burke   +2 more
  +9 more sources

Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. [PDF]

open access: yesSensors (Basel), 2019
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats.
Mansoor K   +5 more
europepmc   +2 more sources

RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices.
Hao Cheng   +4 more
doaj   +2 more sources

On the Use of Cellular Automata in Symmetric Cryptography [PDF]

open access: greenActa Applicandae Mathematicae, 2006
25 pages, 0 ...
A. Fúster-Sabater, Pino Caballero‐Gil
openalex   +4 more sources

A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]

open access: yesSensors
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li   +4 more
doaj   +2 more sources

Genetic Operators Applied to Symmetric Cryptography

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2019
In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic.
Jefferson Rodríguez   +2 more
doaj   +2 more sources

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been studied extensively.
Christoph Dobraunig   +5 more
doaj   +2 more sources

Symmetric cryptography

open access: gold
Contains fulltext : 310914.pdf (Publisher’s version ) (Open Access)
Seán Murphy, Rachel Player
openalex   +3 more sources

Home - About - Disclaimer - Privacy