Results 301 to 310 of about 807,165 (362)
Some of the next articles are maybe not open access.
2023
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions.The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components ...
Boura, Christina, Naya-Plasencia, MarĂa
openaire +3 more sources
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions.The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components ...
Boura, Christina, Naya-Plasencia, MarĂa
openaire +3 more sources
Ambiguous Multi-Symmetric Cryptography
2015 IEEE International Conference on Communications (ICC), 2015In this paper, we propose a new method called Ambiguous Multi-Symmetric Cryptography (AMSC) that conceals multiple plain-texts in a cipher-text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed.
Ye Zhu +3 more
openaire +3 more sources
Secure Key Establishment Protocol for Smart Homes Based on Symmetric Cryptography
International Conference on Information Networking, 2022Smart home devices can offer people more convenient control over things in the home. This is achieved via an Internet of Things (IoT) application that is concerned with two essential aspects: power consumption and security concerns. Many researchers have
Chalee Thammarat, Chian Techapanupreeda
semanticscholar +1 more source
Hybrid symmetric cryptography approach for secure communication in web application
Journal of Discrete Mathematical Sciences and Cryptography, 2021Cryptography is a science that studies methods so that data or messages remain safe when sent, from the sender to the recipient without experiencing interference from unauthorized parties.
V. Kapoor, Rati Gupta
semanticscholar +1 more source
Symmetric Cryptography in Javascript
2009 Annual Computer Security Applications Conference, 2009We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, and observe that traditional crypto optimization techniques do not apply when implemented in Javascript.
Dan Boneh, Emily Stark, Michael Hamburg
openaire +2 more sources
Introduction to Modern Cryptography
, 2020Preface I. Introduction and Classical Cryptography Introduction Cryptography and Modern Cryptography The Setting of Private-Key Encryption Historical Ciphers and Their Cryptanalysis Principles of Modern Cryptography Principle 1 - Formal Definitions ...
Jonathan Katz, Yehuda Lindell
semanticscholar +1 more source
Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches
International Symposium on Digital Forensics and Security, 2020Cryptography is the central component of a large number of security solutions. However, most of the existing algorithms do not take into consideration the structure of data, its size, the real-time constraints (latency), and the resource constraints ...
Hassan N. Noura, A. Chehab, R. Couturier
semanticscholar +1 more source
A study and analysis on symmetric cryptography
2014 International Conference on Science Engineering and Management Research (ICSEMR), 2014Technology is advancing day-to-day. For a better and faster technology, information security is a must. This requires data authentication at the execution levels. Cryptography is a useful tool through which secure data independency can be established. It uses two basic operations namely encryption and decryption for secure data communication.
Sourabh Chandra +3 more
openaire +2 more sources
Fingerprint based symmetric cryptography
2014 International Conference on High Performance Computing and Applications (ICHPCA), 2014Key management is an important issue in traditional symmetric cryptography. It consists of key generation, key modification and key sharing to establish a message communication between partners. In general, a randomly generated key is shared with the counter partner by transmitting it along with the message or prior to the message communication ...
Debasis Samanta +2 more
openaire +2 more sources
2015
In this chapter, we give an introduction to basic methods of symmetric-key cryptography. At first, we consider symmetric-key encryption.We explain the notions of stream and block ciphers. The operation modes of block ciphers are studied and, as prominent examples for block ciphers, DES and AES are described.
Hans Delfs, Helmut Knebl
openaire +2 more sources
In this chapter, we give an introduction to basic methods of symmetric-key cryptography. At first, we consider symmetric-key encryption.We explain the notions of stream and block ciphers. The operation modes of block ciphers are studied and, as prominent examples for block ciphers, DES and AES are described.
Hans Delfs, Helmut Knebl
openaire +2 more sources

