Results 31 to 40 of about 807,165 (362)

Enhanced RC5 Algorithm using Parallel Computing for Communication Networks

open access: yesIngeniería y Ciencia, 2019
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length.
David Fabián Cevallos Salas
doaj   +1 more source

MECHANISMS FOR ENSURING THE SECURITY OF CHANNELS OF A PROSPECTIVE MANAGEMENT SYSTEM

open access: yesСучасні інформаційні системи, 2022
The development of military (state) control systems in modern conditions of hybrid warfare requires the possibility of rapid expansion of both functionality and scaling of the physical and logical basis of management, increasing the range of ...
Bogdan Tomashevsky   +3 more
doaj   +1 more source

Categorical composable cryptography: extended version [PDF]

open access: yesLogical Methods in Computer Science, 2023
We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography.
Anne Broadbent, Martti Karvonen
doaj   +1 more source

Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms [PDF]

open access: yesEngineering and Technology Journal, 2014
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers
Hala Bahjat Abdul Wahab   +2 more
doaj   +1 more source

Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2019
In cryptography, we know the symmetric key algorithms and asymmetric key algorithms. We know that the asymmetric key algorithm is more secure than the symmetric key algorithm. Affine Cipher uses a symmetric key algorithm.
Maxrizal Maxrizal   +1 more
doaj   +1 more source

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

open access: yesSensors, 2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary   +5 more
doaj   +1 more source

PiouCrypt: Decentralized lattice-based method for visual symmetric cryptography

open access: yesFranklin Open, 2023
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to ...
Navid Abapour, Mohsen Ebadpour
doaj   +1 more source

ID-based cryptography using symmetric primitives [PDF]

open access: yesDesigns, Codes and Cryptography, 2007
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption schemes. We use a general technique which is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a ...
Mitchell, Chris J   +2 more
openaire   +4 more sources

A comparative review on symmetric and asymmetric DNA-based cryptography

open access: yesBulletin of Electrical Engineering and Informatics, 2020
Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information.
B. T. Hammad   +3 more
semanticscholar   +1 more source

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Home - About - Disclaimer - Privacy