Results 21 to 30 of about 8,161,700 (320)
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Signature schemes based on the MPC-in-the-head approach (MPCitH) have either been designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic, CCS16), or starting with an existing primitive such as AES and trying to find ...
Christoph Dobraunig +4 more
semanticscholar +1 more source
Security Enhanced Emergency Situation Detection System for Ambient Assisted Living
Typical wearable devices use a dedicated mobile phone as relay node to transfer the collected sensor data to a server. However, such relay nodes can be faulty or inactive due to various reasons, leading to interruptions of the communication link.
Placide Shabisha +7 more
doaj +1 more source
A Sponge-Based Key Expansion Scheme for Modern Block Ciphers
Many systems in use today require strong cryptographic primitives to ensure confidentiality and integrity of data. This is especially true for energy systems, such as smart grids, as their proper operation is crucial for the existence of a functioning ...
Maciej Sawka, Marcin Niemiec
doaj +1 more source
Arabic Text Encryption Using Artificial Neural Networks [PDF]
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj +1 more source
This research proposes an efficient hybridized approach for symmetrical encryption of image files in bitmap formats. Due to the heavy use of lightweight encryption in fields such as military and corporate workplaces, intruders try to intercept ...
Kanshi Avaneesh +3 more
doaj +1 more source
A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre
In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key.
Cherukuri Aswani Kumar +9 more
doaj +1 more source
Classical and Physical Security of Symmetric Key Cryptographic Algorithms
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly ...
Anubhab Baksi
semanticscholar +1 more source
SIKM – a smart cryptographic key management framework
For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management.
Chaeikar Saman Shojae +3 more
doaj +1 more source
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it.
Enas Tariq Khudair +2 more
doaj +1 more source
TORDES-THE NEW SYMMETRIC KEY ALGORITHM [PDF]
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems.
Pawitar Dulari, Ajay Bhushan
doaj +1 more source

