Results 21 to 30 of about 3,519 (307)

MECHANISMS FOR ENSURING THE SECURITY OF CHANNELS OF A PROSPECTIVE MANAGEMENT SYSTEM

open access: yesСучасні інформаційні системи, 2022
The development of military (state) control systems in modern conditions of hybrid warfare requires the possibility of rapid expansion of both functionality and scaling of the physical and logical basis of management, increasing the range of ...
Bogdan Tomashevsky   +3 more
doaj   +1 more source

Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2019
In cryptography, we know the symmetric key algorithms and asymmetric key algorithms. We know that the asymmetric key algorithm is more secure than the symmetric key algorithm. Affine Cipher uses a symmetric key algorithm.
Maxrizal Maxrizal   +1 more
doaj   +1 more source

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

open access: yesSensors, 2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary   +5 more
doaj   +1 more source

Genetic Operators Applied to Symmetric Cryptography

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2019
In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic.
Jefferson Rodríguez   +2 more
doaj   +1 more source

Integrated Protocols to Ensure Security Services in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Security in current/next generation wireless sensor network (WSN) is challenging, due to its special characteristics and the scarcity of energy, and processing power.
Mohammed Faisal   +2 more
doaj   +1 more source

A Survey on the Quantum Security of Block Cipher-Based Cryptography

open access: yesIEEE Access
The development of quantum computers represents an important advancement in computing, using quantum mechanics to address problems that were previously difficult to solve. This technological advancement poses a challenge for cryptographic systems.
S. E. Bootsma, M. De Vries
doaj   +1 more source

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

Mathematically Based Assessment of the Accuracy of Protection of Cardiac Data Realized with the Help of Cryptography and Steganography

open access: yesMathematics, 2022
This paper describes the application of cryptography and steganography in the protection of cardiac databases. The original cardiac data studied were transformed using a Daubechies wavelet transform.
Galya Georgieva-Tsaneva   +2 more
doaj   +1 more source

RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices.
Hao Cheng   +4 more
doaj   +1 more source

Symmetric Cryptography

open access: yes, 2020
Contains fulltext : 221056.pdf (Publisher’s version ) (Open Access)
Leander, N.G.   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy