Results 11 to 20 of about 46,684 (278)

3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based

open access: yesIEEE Access, 2020
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj   +1 more source

An improved NFC device authentication protocol.

open access: yesPLoS ONE, 2021
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj   +1 more source

Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard

open access: yesCybernetics and Information Technologies, 2023
This research proposes an efficient hybridized approach for symmetrical encryption of image files in bitmap formats. Due to the heavy use of lightweight encryption in fields such as military and corporate workplaces, intruders try to intercept ...
Kanshi Avaneesh   +3 more
doaj   +1 more source

Key Assignment Schemes with Authenticated Encryption, revisited

open access: yesIACR Transactions on Symmetric Cryptology, 2020
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme.
Jeroen Pijnenburg, Bertram Poettering
doaj   +1 more source

An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14-Rounds [PDF]

open access: yes, 2017
Cryptography methods are widely use in digital communication for secure data transaction. Cryptography methods have two categories symmetric and asymmetric. Both types of encrypting have their own importance and limitations.
Lilhore, U. K. (Umesh)   +1 more
core   +1 more source

A Symmetric Encryption Method for Transmitting IEC 62351 Communicaiton Keys in Substations

open access: yesZhongguo dianli, 2019
With the improvement of the information level of the substation, the cyber security problem of information communication has become increasingly prominent.
Fang FANG   +3 more
doaj   +1 more source

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher [PDF]

open access: yes, 2005
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the security of this chaotic cipher against chosen-plaintext attacks, and points out that this ...
B. Schneier   +5 more
core   +5 more sources

Rethinking Searchable Symmetric Encryption

open access: yes2023 IEEE Symposium on Security and Privacy (SP), 2023
ISBN:978-1-6654-9336 ...
Gui, Zichen   +2 more
openaire   +2 more sources

On the Security of Symmetric Encryption Against Mass Surveillance

open access: yesIEEE Access, 2020
For mass surveillance, the algorithm substitution attacks (ASAs) are serious security threats to the symmetric encryption schemes. At CRYPTO 2014, Bellare, Paterson, and Rogaway (BPR) formally developed the security notions of decryptability ...
Da-Zhi Sun, Yi Mu
doaj   +1 more source

Symmetric and Asymmetric Encryption [PDF]

open access: yesACM Computing Surveys, 1979
All cryptosystems currently m use are symmetrm m the sense that they require the transmitter and receiver to share, m secret, either the same pmce of reformation (key) or one of a paLr of related keys easdy computed from each other, the key is used m the encryption process to introduce uncertainty to an unauthorized receiver.
openaire   +2 more sources

Home - About - Disclaimer - Privacy