Results 21 to 30 of about 3,519 (307)
MECHANISMS FOR ENSURING THE SECURITY OF CHANNELS OF A PROSPECTIVE MANAGEMENT SYSTEM
The development of military (state) control systems in modern conditions of hybrid warfare requires the possibility of rapid expansion of both functionality and scaling of the physical and logical basis of management, increasing the range of ...
Bogdan Tomashevsky +3 more
doaj +1 more source
Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys
In cryptography, we know the symmetric key algorithms and asymmetric key algorithms. We know that the asymmetric key algorithm is more secure than the symmetric key algorithm. Affine Cipher uses a symmetric key algorithm.
Maxrizal Maxrizal +1 more
doaj +1 more source
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary +5 more
doaj +1 more source
Genetic Operators Applied to Symmetric Cryptography
In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic.
Jefferson Rodríguez +2 more
doaj +1 more source
Integrated Protocols to Ensure Security Services in Wireless Sensor Networks
Security in current/next generation wireless sensor network (WSN) is challenging, due to its special characteristics and the scarcity of energy, and processing power.
Mohammed Faisal +2 more
doaj +1 more source
A Survey on the Quantum Security of Block Cipher-Based Cryptography
The development of quantum computers represents an important advancement in computing, using quantum mechanics to address problems that were previously difficult to solve. This technological advancement poses a challenge for cryptographic systems.
S. E. Bootsma, M. De Vries
doaj +1 more source
A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi +2 more
doaj +1 more source
This paper describes the application of cryptography and steganography in the protection of cardiac databases. The original cardiac data studied were transformed using a Daubechies wavelet transform.
Galya Georgieva-Tsaneva +2 more
doaj +1 more source
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices.
Hao Cheng +4 more
doaj +1 more source
Contains fulltext : 221056.pdf (Publisher’s version ) (Open Access)
Leander, N.G. +3 more
openaire +2 more sources

