Results 301 to 310 of about 807,165 (362)
Some of the next articles are maybe not open access.

Symmetric Cryptography 1

2023
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions.The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components ...
Boura, Christina, Naya-Plasencia, MarĂ­a
openaire   +3 more sources

Ambiguous Multi-Symmetric Cryptography

2015 IEEE International Conference on Communications (ICC), 2015
In this paper, we propose a new method called Ambiguous Multi-Symmetric Cryptography (AMSC) that conceals multiple plain-texts in a cipher-text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed.
Ye Zhu   +3 more
openaire   +3 more sources

Secure Key Establishment Protocol for Smart Homes Based on Symmetric Cryptography

International Conference on Information Networking, 2022
Smart home devices can offer people more convenient control over things in the home. This is achieved via an Internet of Things (IoT) application that is concerned with two essential aspects: power consumption and security concerns. Many researchers have
Chalee Thammarat, Chian Techapanupreeda
semanticscholar   +1 more source

Hybrid symmetric cryptography approach for secure communication in web application

Journal of Discrete Mathematical Sciences and Cryptography, 2021
Cryptography is a science that studies methods so that data or messages remain safe when sent, from the sender to the recipient without experiencing interference from unauthorized parties.
V. Kapoor, Rati Gupta
semanticscholar   +1 more source

Symmetric Cryptography in Javascript

2009 Annual Computer Security Applications Conference, 2009
We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, and observe that traditional crypto optimization techniques do not apply when implemented in Javascript.
Dan Boneh, Emily Stark, Michael Hamburg
openaire   +2 more sources

Introduction to Modern Cryptography

, 2020
Preface I. Introduction and Classical Cryptography Introduction Cryptography and Modern Cryptography The Setting of Private-Key Encryption Historical Ciphers and Their Cryptanalysis Principles of Modern Cryptography Principle 1 - Formal Definitions ...
Jonathan Katz, Yehuda Lindell
semanticscholar   +1 more source

Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches

International Symposium on Digital Forensics and Security, 2020
Cryptography is the central component of a large number of security solutions. However, most of the existing algorithms do not take into consideration the structure of data, its size, the real-time constraints (latency), and the resource constraints ...
Hassan N. Noura, A. Chehab, R. Couturier
semanticscholar   +1 more source

A study and analysis on symmetric cryptography

2014 International Conference on Science Engineering and Management Research (ICSEMR), 2014
Technology is advancing day-to-day. For a better and faster technology, information security is a must. This requires data authentication at the execution levels. Cryptography is a useful tool through which secure data independency can be established. It uses two basic operations namely encryption and decryption for secure data communication.
Sourabh Chandra   +3 more
openaire   +2 more sources

Fingerprint based symmetric cryptography

2014 International Conference on High Performance Computing and Applications (ICHPCA), 2014
Key management is an important issue in traditional symmetric cryptography. It consists of key generation, key modification and key sharing to establish a message communication between partners. In general, a randomly generated key is shared with the counter partner by transmitting it along with the message or prior to the message communication ...
Debasis Samanta   +2 more
openaire   +2 more sources

Symmetric-Key Cryptography

2015
In this chapter, we give an introduction to basic methods of symmetric-key cryptography. At first, we consider symmetric-key encryption.We explain the notions of stream and block ciphers. The operation modes of block ciphers are studied and, as prominent examples for block ciphers, DES and AES are described.
Hans Delfs, Helmut Knebl
openaire   +2 more sources

Home - About - Disclaimer - Privacy