Results 61 to 70 of about 48,518 (327)
trengthened Key Method in Transition to Quantum Cryptology
This study aims to increase security during the transition period against the threats posed by quantum computers to existing cryptographic systems. Since it will take time for post-quantum cryptography standards to become fully applicable, especially ...
Fatih Selvi , Mustafa Alkan
doaj +1 more source
This study discusses specifically the encryption mechanism that maintains the integrity of the game data on online games. The purpose of this study is to implement symmetric key encryption and checksum for score calculation.
Herru Darmadi
doaj +1 more source
A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan +2 more
core +1 more source
Database Padding for Dynamic Symmetric Searchable Encryption [PDF]
Ruizhong Du, Yuqing Zhang, Mingyue Li
openalex +1 more source
A chiral photodetector capable of selectively distinguishing left‐ and right‐handed circularly polarized light is experimentally demonstrated. The device, which features a nanopatterned electrode inverse‐designed by a genetic algorithm within a metal–dielectric–metal nanocavity that incorporates a vacuum‐deposited small‐molecule multilayer, exhibits ...
Kyung Ryoul Park +3 more
wiley +1 more source
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei +5 more
doaj +1 more source
Outer-Convex Dominating Set in the Corona of Graphs as Encryption Key Generator
In this paper, we present a new type of symmetric encryption by converting the classical monoalphabetic affine cipher into a polyalphabetic cipher. The proposed encryption utilizes the properties of outer-convex dominating set in the corona of graphs to ...
Zehui Shao +4 more
doaj +1 more source
A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles [PDF]
Vincent Omollo Nyangaresi +6 more
openalex +1 more source
Predicting Atomic Charges in MOFs by Topological Charge Equilibration
An atomic charge prediction method is presented that is able to accurately reproduce ab‐initio‐derived reference charges for a large number of metal–organic frameworks. Based on a topological charge equilibration scheme, static charges that fulfill overall neutrality are quickly generated.
Babak Farhadi Jahromi +2 more
wiley +1 more source
Modern symmetric searchable encryption technique for string classification in cloud technology [PDF]
Nesar Ahmad, Supriya Raj
openalex +1 more source

