Results 11 to 20 of about 46,684 (278)
3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj +1 more source
An improved NFC device authentication protocol.
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj +1 more source
This research proposes an efficient hybridized approach for symmetrical encryption of image files in bitmap formats. Due to the heavy use of lightweight encryption in fields such as military and corporate workplaces, intruders try to intercept ...
Kanshi Avaneesh +3 more
doaj +1 more source
Key Assignment Schemes with Authenticated Encryption, revisited
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme.
Jeroen Pijnenburg, Bertram Poettering
doaj +1 more source
An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14-Rounds [PDF]
Cryptography methods are widely use in digital communication for secure data transaction. Cryptography methods have two categories symmetric and asymmetric. Both types of encrypting have their own importance and limitations.
Lilhore, U. K. (Umesh) +1 more
core +1 more source
A Symmetric Encryption Method for Transmitting IEC 62351 Communicaiton Keys in Substations
With the improvement of the information level of the substation, the cyber security problem of information communication has become increasingly prominent.
Fang FANG +3 more
doaj +1 more source
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher [PDF]
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the security of this chaotic cipher against chosen-plaintext attacks, and points out that this ...
B. Schneier +5 more
core +5 more sources
Rethinking Searchable Symmetric Encryption
ISBN:978-1-6654-9336 ...
Gui, Zichen +2 more
openaire +2 more sources
On the Security of Symmetric Encryption Against Mass Surveillance
For mass surveillance, the algorithm substitution attacks (ASAs) are serious security threats to the symmetric encryption schemes. At CRYPTO 2014, Bellare, Paterson, and Rogaway (BPR) formally developed the security notions of decryptability ...
Da-Zhi Sun, Yi Mu
doaj +1 more source
Symmetric and Asymmetric Encryption [PDF]
All cryptosystems currently m use are symmetrm m the sense that they require the transmitter and receiver to share, m secret, either the same pmce of reformation (key) or one of a paLr of related keys easdy computed from each other, the key is used m the encryption process to introduce uncertainty to an unauthorized receiver.
openaire +2 more sources

