Results 261 to 270 of about 3,519 (307)
Some of the next articles are maybe not open access.
2023
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions.The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components ...
Boura, Christina, Naya-Plasencia, María
openaire +2 more sources
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions.The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components ...
Boura, Christina, Naya-Plasencia, María
openaire +2 more sources
Fingerprint based symmetric cryptography
2014 International Conference on High Performance Computing and Applications (ICHPCA), 2014Key management is an important issue in traditional symmetric cryptography. It consists of key generation, key modification and key sharing to establish a message communication between partners. In general, a randomly generated key is shared with the counter partner by transmitting it along with the message or prior to the message communication ...
Subhas Barman +2 more
openaire +1 more source
Ambiguous Multi-Symmetric Cryptography
2015 IEEE International Conference on Communications (ICC), 2015In this paper, we propose a new method called Ambiguous Multi-Symmetric Cryptography (AMSC) that conceals multiple plain-texts in a cipher-text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed.
Richard Bassous +3 more
openaire +1 more source
2015
In this chapter, we give an introduction to basic methods of symmetric-key cryptography. At first, we consider symmetric-key encryption.We explain the notions of stream and block ciphers. The operation modes of block ciphers are studied and, as prominent examples for block ciphers, DES and AES are described.
Hans Delfs, Helmut Knebl
openaire +1 more source
In this chapter, we give an introduction to basic methods of symmetric-key cryptography. At first, we consider symmetric-key encryption.We explain the notions of stream and block ciphers. The operation modes of block ciphers are studied and, as prominent examples for block ciphers, DES and AES are described.
Hans Delfs, Helmut Knebl
openaire +1 more source
Symmetric Cryptography in Javascript
2009 Annual Computer Security Applications Conference, 2009We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, and observe that traditional crypto optimization techniques do not apply when implemented in Javascript.
Emily Stark, Michael Hamburg, Dan Boneh
openaire +1 more source
Foundations of Symmetric Cryptography
2013This chapter presents asymmetric key cryptography, also known as public-key cryptography. It introduces the first asymmetric algorithm, invented by Diffie and Hellman, as well as the ElGamal algorithm. Moreover, we describe in detail a very well-known example of an asymmetric cryptosystem called RSA.
Czesław Kościelny +2 more
openaire +1 more source
Fundamentals of Symmetric Cryptography
2006Cryptology provides two different flavors of algorithms, namely symmetric and asymmetric (public-key) algorithms. This contribution deals with asymmetric algorithms.
Thomas Wollinger, Sandeep Kumar
openaire +1 more source
On Length-Preserving Symmetric Cryptography
2007This paper focuses on the length-preserving symmetric cryptography, with which people can encrypt messages of variable length (especially arbitrary length) to get ciphertext of length identical to that of plaintext being encrypted. Two confidentiality modes being able to achieve length-preserving encryption, i.e., OFB mode and CTR mode, are analyzed in
Zheng Jianwu, Liu Hui, Liu Mingsheng
openaire +1 more source

