Results 241 to 250 of about 928,376 (284)
Some of the next articles are maybe not open access.
The management of symmetric keys
Information Security Technical Report, 1997Abstract This paper defines three classes of key management protocol that can be used to establish symmetric cryptographic keys. It explores the relationship between the classes and the communications techniques used to carry data protected by the symmetric keys.
openaire +1 more source
Key Grids: A Protocol Family for Assigning Symmetric Keys
Proceedings of the 2006 IEEE International Conference on Network Protocols, 2006We describe a family of log n protocols for assigning symmetric keys to n processes in a network so that each process can use its assigned keys to communicate securely with every other process. The k-th protocol in our protocol family, where 1 les k les log n, assigns O(k2 kradicn) symmetric keys to each process in the network.
Amitanand S. Aiyer +2 more
openaire +1 more source
Symmetric-key cryptosystem with DNA technology
Science in China Series F: Information Sciences, 2007zbMATH Open Web Interface contents unavailable due to conflicting licenses.
MingXin Lu +3 more
openaire +2 more sources
2002
Symmetric-key encryption schemes provide secure communication for a pair of communication partners. An adversary who intercepts a message should not get any significant information about its content. In this chapter, we give a short introduction to symmetric-key encryption. We explain the notions of stream and block ciphers.
Hans Delfs, Helmut Knebl
openaire +1 more source
Symmetric-key encryption schemes provide secure communication for a pair of communication partners. An adversary who intercepts a message should not get any significant information about its content. In this chapter, we give a short introduction to symmetric-key encryption. We explain the notions of stream and block ciphers.
Hans Delfs, Helmut Knebl
openaire +1 more source
A New Development of Symmetric Key Cryptosystem
2008 IEEE International Conference on Communications, 2008Security issues have become a main concern modern life. A powerful cryptosystem has to be practical, secure and able to be implemented on different platforms. The goal of this paper is to develop a basis of cryptographic scheme which utilizes some advanced transform techniques. A symmetric cryptographic system is proposed based on Shannon's concepts of
Xiao Bo Yang, Said Boussakta
openaire +1 more source
2015
In this chapter, we give an introduction to basic methods of symmetric-key cryptography. At first, we consider symmetric-key encryption.We explain the notions of stream and block ciphers. The operation modes of block ciphers are studied and, as prominent examples for block ciphers, DES and AES are described.
Hans Delfs, Helmut Knebl
openaire +1 more source
In this chapter, we give an introduction to basic methods of symmetric-key cryptography. At first, we consider symmetric-key encryption.We explain the notions of stream and block ciphers. The operation modes of block ciphers are studied and, as prominent examples for block ciphers, DES and AES are described.
Hans Delfs, Helmut Knebl
openaire +1 more source
A symmetric key watermark for halftone images
2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)., 2003In many printer and publishing applications, it is desirable to embed data in halftone images for copyright control and authentication purposes. While intentional attacks on printed matters may not be likely, unintentional attacks such as cropping and distortion due to dirt or human writing/marking are likely.
Oscar C. Au, Ming Sun Fu
openaire +1 more source
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
Information Sciences, 2014zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Alireza T. Boloorchi +2 more
openaire +2 more sources
Secure Session Key Sharing Using Symmetric Key Cryptography
2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018Information security is a major concern when the information is transmitted via telecommunication systems (wired or wireless). This security is provided by cryptography, which ensures the secure transmission of data over the internet. Two types of cryptographic techniques are used for the encryption and decryption of data, first being symmetric key and
Shweta Arora, Muzzammil Hussain
openaire +1 more source
Key techniques of symmetrical machining
Journal of Shanghai University (English Edition), 2008To improve the machining efficiency of large symmetrical freeform surface, this paper proposes a new machining method: symmetrical machining (SM). Based on the concept of collision avoidance plane (CAP), collisions among cutters or headstocks are avoided, and the area of machining residue is controlled effectively.
Lin-sen Zhu +4 more
openaire +1 more source

