Results 11 to 20 of about 3,519 (307)

IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2022
The object of the study is the processes of building groups of symmetric double-operand operations of cryptographic coding of information. The subject of the study are features of the implementation of a generalized method of synthesis groups of ...
Nataliia Lada, Yuliia Rudnytska
doaj   +1 more source

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection

open access: yesEmitter: International Journal of Engineering Technology, 2020
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members.
Anindya Dwi Putri Islamidina   +2 more
doaj   +1 more source

Implementasi Protokol Diffie-Hellman Dan Algoritma RC4 Untuk Keamanan Pesan SMS

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2015
Abstrack— SMS now becomes such a need for cellular phone users to communicate to other people. But the cellular phone users do not realize that the sent messages could be intercepted or changed by an unwanted party.
Decky Hendarsyah, Retantyo Wardoyo
doaj   +1 more source

Sensitivities and block sensitivities of elementary symmetric Boolean functions

open access: yesJournal of Mathematical Cryptology, 2021
Boolean functions have important applications in molecular regulatory networks, engineering, cryptography, information technology, and computer science. Symmetric Boolean functions have received a lot of attention in several decades.
Zhang Jing, Li Yuan, Adeyeye John O.
doaj   +1 more source

Symmetric Cryptography

open access: yes, 2023
AbstractSymmetric encryption is the most common method to guarantee the confidentiality of a message or information. Encryption is a cryptographic process that makes it impossible for anyone who needs the decryption key to gain knowledge of plaintext. It is called symmetric when it uses the same key for encryption and decryption.
François Weissbaum, Thomas Lugrin
openaire   +1 more source

Enhanced RC5 Algorithm using Parallel Computing for Communication Networks

open access: yesIngeniería y Ciencia, 2019
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length.
David Fabián Cevallos Salas
doaj   +1 more source

PiouCrypt: Decentralized lattice-based method for visual symmetric cryptography

open access: yesFranklin Open, 2023
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to ...
Navid Abapour, Mohsen Ebadpour
doaj   +1 more source

Categorical composable cryptography: extended version [PDF]

open access: yesLogical Methods in Computer Science, 2023
We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography.
Anne Broadbent, Martti Karvonen
doaj   +1 more source

Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms [PDF]

open access: yesEngineering and Technology Journal, 2014
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers
Hala Bahjat Abdul Wahab   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy