Results 61 to 70 of about 48,518 (327)

trengthened Key Method in Transition to Quantum Cryptology

open access: yesGazi Üniversitesi Fen Bilimleri Dergisi
This study aims to increase security during the transition period against the threats posed by quantum computers to existing cryptographic systems. Since it will take time for post-quantum cryptography standards to become fully applicable, especially ...
Fatih Selvi , Mustafa Alkan
doaj   +1 more source

Implementasi Mekanisme Keamanan Data dengan Enkripsi Symmetric Key dan Checksum Variable pada Game Online

open access: yesComTech, 2013
This study discusses specifically the encryption mechanism that maintains the integrity of the game data on online games. The purpose of this study is to implement symmetric key encryption and checksum for score calculation.
Herru Darmadi
doaj   +1 more source

A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data

open access: yes, 2018
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan   +2 more
core   +1 more source

Circular‐Polarization‐Sensitive Organic Photodetectors with a Chiral Nanopatterned Electrode Inverse‐Designed by Genetic Algorithm

open access: yesAdvanced Functional Materials, EarlyView.
A chiral photodetector capable of selectively distinguishing left‐ and right‐handed circularly polarized light is experimentally demonstrated. The device, which features a nanopatterned electrode inverse‐designed by a genetic algorithm within a metal–dielectric–metal nanocavity that incorporates a vacuum‐deposited small‐molecule multilayer, exhibits ...
Kyung Ryoul Park   +3 more
wiley   +1 more source

Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei   +5 more
doaj   +1 more source

Outer-Convex Dominating Set in the Corona of Graphs as Encryption Key Generator

open access: yesComplexity, 2020
In this paper, we present a new type of symmetric encryption by converting the classical monoalphabetic affine cipher into a polyalphabetic cipher. The proposed encryption utilizes the properties of outer-convex dominating set in the corona of graphs to ...
Zehui Shao   +4 more
doaj   +1 more source

A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles [PDF]

open access: gold, 2023
Vincent Omollo Nyangaresi   +6 more
openalex   +1 more source

Predicting Atomic Charges in MOFs by Topological Charge Equilibration

open access: yesAdvanced Functional Materials, EarlyView.
An atomic charge prediction method is presented that is able to accurately reproduce ab‐initio‐derived reference charges for a large number of metal–organic frameworks. Based on a topological charge equilibration scheme, static charges that fulfill overall neutrality are quickly generated.
Babak Farhadi Jahromi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy