Results 11 to 20 of about 807,165 (362)
Quantum asymmetric cryptography with symmetric keys
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography.
Qiao-Yan Wen +3 more
openaire +5 more sources
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, Charles Ci Wen Lim
doaj +3 more sources
09031 Abstracts Collection – Symmetric Cryptography [PDF]
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography '' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed.
Handschuh, Helena +3 more
openaire +5 more sources
Variational quantum attacks threaten advanced encryption standard based symmetric cryptography [PDF]
We propose a variational quantum attack algorithm (VQAA) for classical advanced encryption standard (AES)-like symmetric cryptography, as exemplified by the simplified-data encryption standard (S-DES).
Zeguo Wang +3 more
semanticscholar +1 more source
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang +5 more
doaj +1 more source
Proposal to Generate a Various Key from Image for Various Encryption Methods [PDF]
There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages.
Shatha Habeeb, Eman Shakeer
doaj +1 more source
Medical images can be constructed in two-dimensional (2D) or three-dimensional (3D) view imaging to be applied in disease detection and diagnosis inside the body, such as cancer/tumor, heart, or lung-related diseases.
Chia‐Hung Lin +6 more
semanticscholar +1 more source
Digital physiological signals in telecare medicine information systems have been widely applied in remote medical applications, such as telecare, tele-examination, and telediagnosis, via computer networking transmission or wireless communication. However,
Chia‐Hung Lin +5 more
semanticscholar +1 more source
Transitory Master Key Transport Layer Security for WSNs
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti +2 more
doaj +1 more source
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from ...
Mustafa Abd Zaid, Soukaena Hassan
doaj +1 more source

