Results 311 to 320 of about 807,165 (362)
Some of the next articles are maybe not open access.
Foundations of Symmetric Cryptography
2013This chapter presents asymmetric key cryptography, also known as public-key cryptography. It introduces the first asymmetric algorithm, invented by Diffie and Hellman, as well as the ElGamal algorithm. Moreover, we describe in detail a very well-known example of an asymmetric cryptosystem called RSA.
Mirosław Kurkowski +3 more
openaire +3 more sources
Random S-Boxes Generation Methods for Symmetric Cryptography
2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON), 2019The main efficiency indicators of cryptographic Boolean functions and vector mappings, which are used as nodes of the complexity in symmetric cryptographic transformations, are substantiated.
I. Gorbenko +5 more
semanticscholar +1 more source
Fundamentals of Symmetric Cryptography
2006Cryptology provides two different flavors of algorithms, namely symmetric and asymmetric (public-key) algorithms. This contribution deals with asymmetric algorithms.
Sandeep Kumar, Thomas Wollinger
openaire +3 more sources
A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security
International Journal of Scientific and Research Publications (IJSRP), 2019This paper discusses several important algorithms used for the encryption and decryption of data in all fields, to make a comparative study for most important algorithms in terms of speed (implementation) and security (special keys) determine whether an ...
M. Al-Shabi
semanticscholar +1 more source
On Length-Preserving Symmetric Cryptography
2007This paper focuses on the length-preserving symmetric cryptography, with which people can encrypt messages of variable length (especially arbitrary length) to get ciphertext of length identical to that of plaintext being encrypted. Two confidentiality modes being able to achieve length-preserving encryption, i.e., OFB mode and CTR mode, are analyzed in
Liu Hui, Liu Mingsheng, Zheng Jianwu
openaire +2 more sources
Symmetric Cryptography and Algebraic Curves
Algebraic Geometry and Its Applications, 2008We discuss some applications of the theory of algebraic curves to the study of S-boxes in symmetric cryptography. 0. Introduction A symmetric block cipher usually consists of several iterations (rounds) of the following operations on the input message: An F2-linear transformation (to “mix the bits”), a nonlinear map (consisting of one or several S ...
openaire +2 more sources
Lightweight Involutive Components for Symmetric Cryptography
2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), 2019Lightweight components are used in the design of modern lightweight ciphers. In the current paper, firstly we investigate a new family of lightweight $4\times 4$ almost MDS diffusion layers, mathematically, and determine when they are involutive. The proposed diffusion layers are suitable for software applications and have less fixed points, compared
A. Mahmoodi Rishakani +2 more
openaire +2 more sources
Practical Leakage-Resilient Symmetric Cryptography
2012Leakage resilient cryptography attempts to incorporate side-channel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount of arbitrary information about the schemes internal state ...
Sebastian Faust +2 more
openaire +2 more sources
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications
IACR Cryptology ePrint Archive, 2021Itai Dinur +6 more
semanticscholar +1 more source
Public key versus symmetric key cryptography in client–server authentication protocols
International Journal of Information Security, 2021An Braeken
semanticscholar +1 more source

