Results 31 to 40 of about 8,161,700 (320)
Proposal for Complex AES Security using key Generator and Text Permutation [PDF]
Advanced Encryption Standard (AES) is a symmetric-key encryption each ofthese ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits.
Shatha Habeeb
doaj +1 more source
Proposal of New Keys Generator for DES Algorithms Depending on Multi Techniques [PDF]
The requirements of an ordinary PRNG are also satisfied by a cryptographically secure PRNG, but the reverse is not true. CSPRNG requirements fall into two groups: first, that they pass statistical randomness tests; and secondly, that they hold up well ...
Alaa Kadhim, Mohammed Salih
doaj +1 more source
The growth of internet era leads to a major transformation in a storage of data and accessing the applications. One such new trend that promises the endurance is the Cloud computing. Computing resources offered by the Cloud includes the servers, networks,
Debabrata Samanta +6 more
doaj +1 more source
Finite key analysis for symmetric attacks in quantum key distribution [PDF]
We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given.
A. Rényi +9 more
core +2 more sources
This work investigates a generic way of combining two very effective and well-studied cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack introduced by Wagner in FSE 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017.
Mostafizar Rahman +2 more
doaj +1 more source
Tree based symmetric key broadcast encryption [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bhattacherjee, Sanjay, Sarkar, Palash
openaire +1 more source
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
A. Aly +4 more
semanticscholar +1 more source
Review on Cryptography Techniques in Network Security
This article's aim is to provide an overview of network security encryption technologies. This article discusses the different types of cryptographic techniques, advantages, and disadvantages of cryptography on network security.
Angela Gan
doaj +1 more source
A Demazure crystal construction for Schubert polynomials [PDF]
Stanley symmetric functions are the stable limits of Schubert polynomials. In this paper, we show that, conversely, Schubert polynomials are Demazure truncations of Stanley symmetric functions.
Assaf, Sami, Schilling, Anne
core +3 more sources
Steganography Based on Data Mapping and LSB Substitution With RSS Key Generation
ABSTRAK Untuk menghindari pihak ketiga yang tidak berwenang, berbagai solusi keamanan telah dibuat untuk mengamankan kerahasiaan pesan atau informasi, salah satunya adalah steganografi.
MUHAMMAD TAUFIQ SUMADI +2 more
doaj +1 more source

