Results 31 to 40 of about 8,161,700 (320)

Proposal for Complex AES Security using key Generator and Text Permutation [PDF]

open access: yesEngineering and Technology Journal, 2012
Advanced Encryption Standard (AES) is a symmetric-key encryption each ofthese ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits.
Shatha Habeeb
doaj   +1 more source

Proposal of New Keys Generator for DES Algorithms Depending on Multi Techniques [PDF]

open access: yesEngineering and Technology Journal, 2014
The requirements of an ordinary PRNG are also satisfied by a cryptographically secure PRNG, but the reverse is not true. CSPRNG requirements fall into two groups: first, that they pass statistical randomness tests; and secondly, that they hold up well ...
Alaa Kadhim, Mohammed Salih
doaj   +1 more source

Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture

open access: yesIEEE Access, 2021
The growth of internet era leads to a major transformation in a storage of data and accessing the applications. One such new trend that promises the endurance is the Cloud computing. Computing resources offered by the Cloud includes the servers, networks,
Debabrata Samanta   +6 more
doaj   +1 more source

Finite key analysis for symmetric attacks in quantum key distribution [PDF]

open access: yes, 2006
We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given.
A. Rényi   +9 more
core   +2 more sources

Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos

open access: yesIACR Transactions on Symmetric Cryptology, 2021
This work investigates a generic way of combining two very effective and well-studied cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack introduced by Wagner in FSE 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017.
Mostafizar Rahman   +2 more
doaj   +1 more source

Tree based symmetric key broadcast encryption [PDF]

open access: yesJournal of Discrete Algorithms, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bhattacherjee, Sanjay, Sarkar, Palash
openaire   +1 more source

Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

open access: yesIACR Transactions on Symmetric Cryptology, 2020
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
A. Aly   +4 more
semanticscholar   +1 more source

Review on Cryptography Techniques in Network Security

open access: yesJournal of ICT in Education, 2021
This article's aim is to provide an overview of network security encryption technologies. This article discusses the different types of cryptographic techniques, advantages, and disadvantages of cryptography on network security.
Angela Gan
doaj   +1 more source

A Demazure crystal construction for Schubert polynomials [PDF]

open access: yes, 2017
Stanley symmetric functions are the stable limits of Schubert polynomials. In this paper, we show that, conversely, Schubert polynomials are Demazure truncations of Stanley symmetric functions.
Assaf, Sami, Schilling, Anne
core   +3 more sources

Steganography Based on Data Mapping and LSB Substitution With RSS Key Generation

open access: yesJurnal Elkomika, 2022
ABSTRAK Untuk menghindari pihak ketiga yang tidak berwenang, berbagai solusi keamanan telah dibuat untuk mengamankan kerahasiaan pesan atau informasi, salah satunya adalah steganografi.
MUHAMMAD TAUFIQ SUMADI   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy