Results 21 to 30 of about 49,036 (287)

Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2019
In cryptography, we know the symmetric key algorithms and asymmetric key algorithms. We know that the asymmetric key algorithm is more secure than the symmetric key algorithm. Affine Cipher uses a symmetric key algorithm.
Maxrizal Maxrizal   +1 more
doaj   +1 more source

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

open access: yesSensors, 2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary   +5 more
doaj   +1 more source

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Genetic Operators Applied to Symmetric Cryptography

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2019
In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic.
Jefferson Rodríguez   +2 more
doaj   +1 more source

Review on DNA Cryptography [PDF]

open access: yes, 2019
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core   +3 more sources

Integrated Protocols to Ensure Security Services in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Security in current/next generation wireless sensor network (WSN) is challenging, due to its special characteristics and the scarcity of energy, and processing power.
Mohammed Faisal   +2 more
doaj   +1 more source

Multidomain Network Based on Programmable Networks: Security Architecture [PDF]

open access: yes, 2005
This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes ...
Alarcos, Bernardo   +2 more
core   +2 more sources

A Survey on the Quantum Security of Block Cipher-Based Cryptography

open access: yesIEEE Access
The development of quantum computers represents an important advancement in computing, using quantum mechanics to address problems that were previously difficult to solve. This technological advancement poses a challenge for cryptographic systems.
S. E. Bootsma, M. De Vries
doaj   +1 more source

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

Regular subgroups with large intersection

open access: yes, 2018
In this paper we study the relationships between the elementary abelian regular subgroups and the Sylow $2$-subgroups of their normalisers in the symmetric group $\mathrm{Sym}(\mathbb{F}_2^n)$, in view of the interest that they have recently raised for ...
Aragona, Riccardo   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy