Results 11 to 20 of about 807,165 (362)

Quantum asymmetric cryptography with symmetric keys

open access: yesScience in China Series G: Physics, Mechanics and Astronomy, 2009
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography.
Qiao-Yan Wen   +3 more
openaire   +5 more sources

Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography

open access: yesEntropy, 2020
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, Charles Ci Wen Lim
doaj   +3 more sources

09031 Abstracts Collection – Symmetric Cryptography [PDF]

open access: yes, 2009
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography '' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed.
Handschuh, Helena   +3 more
openaire   +5 more sources

Variational quantum attacks threaten advanced encryption standard based symmetric cryptography [PDF]

open access: yesScience China Information Sciences, 2022
We propose a variational quantum attack algorithm (VQAA) for classical advanced encryption standard (AES)-like symmetric cryptography, as exemplified by the simplified-data encryption standard (S-DES).
Zeguo Wang   +3 more
semanticscholar   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Proposal to Generate a Various Key from Image for Various Encryption Methods [PDF]

open access: yesEngineering and Technology Journal, 2013
There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages.
Shatha Habeeb, Eman Shakeer
doaj   +1 more source

Intelligent Symmetric Cryptography With Chaotic Map and Quantum Based Key Generator for Medical Images Infosecurity

open access: yesIEEE Access, 2021
Medical images can be constructed in two-dimensional (2D) or three-dimensional (3D) view imaging to be applied in disease detection and diagnosis inside the body, such as cancer/tumor, heart, or lung-related diseases.
Chia‐Hung Lin   +6 more
semanticscholar   +1 more source

Symmetric Cryptography With a Chaotic Map and a Multilayer Machine Learning Network for Physiological Signal Infosecurity: Case Study in Electrocardiogram

open access: yesIEEE Access, 2021
Digital physiological signals in telecare medicine information systems have been widely applied in remote medical applications, such as telecare, tele-examination, and telediagnosis, via computer networking transmission or wireless communication. However,
Chia‐Hung Lin   +5 more
semanticscholar   +1 more source

Transitory Master Key Transport Layer Security for WSNs

open access: yesIEEE Access, 2020
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti   +2 more
doaj   +1 more source

Survey on Modern Cryptography

open access: yesJournal of Kufa for Mathematics and Computer, 2021
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from ...
Mustafa Abd Zaid, Soukaena Hassan
doaj   +1 more source

Home - About - Disclaimer - Privacy