Results 261 to 270 of about 3,519 (307)
Some of the next articles are maybe not open access.

Symmetric Cryptography 1

2023
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions.The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components ...
Boura, Christina, Naya-Plasencia, María
openaire   +2 more sources

Fingerprint based symmetric cryptography

2014 International Conference on High Performance Computing and Applications (ICHPCA), 2014
Key management is an important issue in traditional symmetric cryptography. It consists of key generation, key modification and key sharing to establish a message communication between partners. In general, a randomly generated key is shared with the counter partner by transmitting it along with the message or prior to the message communication ...
Subhas Barman   +2 more
openaire   +1 more source

Ambiguous Multi-Symmetric Cryptography

2015 IEEE International Conference on Communications (ICC), 2015
In this paper, we propose a new method called Ambiguous Multi-Symmetric Cryptography (AMSC) that conceals multiple plain-texts in a cipher-text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed.
Richard Bassous   +3 more
openaire   +1 more source

Symmetric-Key Cryptography

2015
In this chapter, we give an introduction to basic methods of symmetric-key cryptography. At first, we consider symmetric-key encryption.We explain the notions of stream and block ciphers. The operation modes of block ciphers are studied and, as prominent examples for block ciphers, DES and AES are described.
Hans Delfs, Helmut Knebl
openaire   +1 more source

Symmetric Cryptography in Javascript

2009 Annual Computer Security Applications Conference, 2009
We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, and observe that traditional crypto optimization techniques do not apply when implemented in Javascript.
Emily Stark, Michael Hamburg, Dan Boneh
openaire   +1 more source

Foundations of Symmetric Cryptography

2013
This chapter presents asymmetric key cryptography, also known as public-key cryptography. It introduces the first asymmetric algorithm, invented by Diffie and Hellman, as well as the ElGamal algorithm. Moreover, we describe in detail a very well-known example of an asymmetric cryptosystem called RSA.
Czesław Kościelny   +2 more
openaire   +1 more source

Fundamentals of Symmetric Cryptography

2006
Cryptology provides two different flavors of algorithms, namely symmetric and asymmetric (public-key) algorithms. This contribution deals with asymmetric algorithms.
Thomas Wollinger, Sandeep Kumar
openaire   +1 more source

Symmetric Key Cryptography

2021
Pawel Sniatala   +2 more
openaire   +1 more source

On Length-Preserving Symmetric Cryptography

2007
This paper focuses on the length-preserving symmetric cryptography, with which people can encrypt messages of variable length (especially arbitrary length) to get ciphertext of length identical to that of plaintext being encrypted. Two confidentiality modes being able to achieve length-preserving encryption, i.e., OFB mode and CTR mode, are analyzed in
Zheng Jianwu, Liu Hui, Liu Mingsheng
openaire   +1 more source

Home - About - Disclaimer - Privacy