Results 311 to 320 of about 807,165 (362)
Some of the next articles are maybe not open access.

Foundations of Symmetric Cryptography

2013
This chapter presents asymmetric key cryptography, also known as public-key cryptography. It introduces the first asymmetric algorithm, invented by Diffie and Hellman, as well as the ElGamal algorithm. Moreover, we describe in detail a very well-known example of an asymmetric cryptosystem called RSA.
Mirosław Kurkowski   +3 more
openaire   +3 more sources

Random S-Boxes Generation Methods for Symmetric Cryptography

2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON), 2019
The main efficiency indicators of cryptographic Boolean functions and vector mappings, which are used as nodes of the complexity in symmetric cryptographic transformations, are substantiated.
I. Gorbenko   +5 more
semanticscholar   +1 more source

Fundamentals of Symmetric Cryptography

2006
Cryptology provides two different flavors of algorithms, namely symmetric and asymmetric (public-key) algorithms. This contribution deals with asymmetric algorithms.
Sandeep Kumar, Thomas Wollinger
openaire   +3 more sources

A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security

International Journal of Scientific and Research Publications (IJSRP), 2019
This paper discusses several important algorithms used for the encryption and decryption of data in all fields, to make a comparative study for most important algorithms in terms of speed (implementation) and security (special keys) determine whether an ...
M. Al-Shabi
semanticscholar   +1 more source

On Length-Preserving Symmetric Cryptography

2007
This paper focuses on the length-preserving symmetric cryptography, with which people can encrypt messages of variable length (especially arbitrary length) to get ciphertext of length identical to that of plaintext being encrypted. Two confidentiality modes being able to achieve length-preserving encryption, i.e., OFB mode and CTR mode, are analyzed in
Liu Hui, Liu Mingsheng, Zheng Jianwu
openaire   +2 more sources

Symmetric Cryptography and Algebraic Curves

Algebraic Geometry and Its Applications, 2008
We discuss some applications of the theory of algebraic curves to the study of S-boxes in symmetric cryptography. 0. Introduction A symmetric block cipher usually consists of several iterations (rounds) of the following operations on the input message: An F2-linear transformation (to “mix the bits”), a nonlinear map (consisting of one or several S ...
openaire   +2 more sources

Lightweight Involutive Components for Symmetric Cryptography

2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), 2019
Lightweight components are used in the design of modern lightweight ciphers. In the current paper, firstly we investigate a new family of lightweight $4\times 4$ almost MDS diffusion layers, mathematically, and determine when they are involutive. The proposed diffusion layers are suitable for software applications and have less fixed points, compared
A. Mahmoodi Rishakani   +2 more
openaire   +2 more sources

Practical Leakage-Resilient Symmetric Cryptography

2012
Leakage resilient cryptography attempts to incorporate side-channel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount of arbitrary information about the schemes internal state ...
Sebastian Faust   +2 more
openaire   +2 more sources

MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications

IACR Cryptology ePrint Archive, 2021
Itai Dinur   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy