Results 41 to 50 of about 8,161,700 (320)

Key management for substations: Symmetric keys, public keys or no keys? [PDF]

open access: yes2011 IEEE/PES Power Systems Conference and Exposition, 2011
In this paper, we discuss symmetric-key and public-key protocols for key management in electricity transmission and distribution substations — both for communication within substations, and between substations and the network control center. Key management in the electricity network is widely regarded as a challenging problem, not only because of the ...
Shailendra Fuloria   +3 more
openaire   +1 more source

Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications

open access: yesIEEE Access, 2022
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies.
Basel Halak   +2 more
doaj   +1 more source

Symmetric Public-Key Encryption [PDF]

open access: yes, 2007
Public-key encryption would seem to be inherently asymmetric. in that only messages sent to a user can be encrypted using his public key. We demonstrate that the use of interactive protocols for sending encrypted messages enables a symmetric use of public keys; we give cryptographic protocols for the following tasks: 1.
Galil, Zvi, Landau, Gad M., Yung, Moti
openaire   +2 more sources

MPC-Friendly Symmetric Key Primitives [PDF]

open access: yesProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
We discuss the design of symmetric primitives, in particular Pseudo-Random Functions (PRFs) which are suitable for use in a secret-sharing based MPC system. We consider three different PRFs: the Naor-Reingold PRF, a PRF based on the Legendre symbol, and a specialized block cipher design called MiMC.
Grassi, Lorenzo   +4 more
openaire   +2 more sources

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Protocols for symmetric secret key establishment: Modern approach

open access: yesVojnotehnički Glasnik, 2022
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems.
Meiran Galis   +3 more
doaj   +1 more source

QKD Based on Symmetric Entangled Bernstein-Vazirani

open access: yesEntropy, 2021
This paper introduces a novel entanglement-based QKD protocol, that makes use of a modified symmetric version of the Bernstein-Vazirani algorithm, in order to achieve secure and efficient key distribution.
Michael Ampatzis, Theodore Andronikos
doaj   +1 more source

SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]

open access: yes, 2018
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong   +3 more
core   +1 more source

A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks

open access: yesEurasian Journal of Science and Engineering
In line with the growth of the e-governate, the Kurdistan Regional Government is actively adopting digital transformation, which underscores the urgent requirement for distinct encryption methods that are practical for the Kurdish alphabet in the fields ...
Newroz Nooralddin Abdulrazaq
doaj   +1 more source

Implementasi Mekanisme Keamanan Data dengan Enkripsi Symmetric Key dan Checksum Variable pada Game Online

open access: yesComTech, 2013
This study discusses specifically the encryption mechanism that maintains the integrity of the game data on online games. The purpose of this study is to implement symmetric key encryption and checksum for score calculation.
Herru Darmadi
doaj   +1 more source

Home - About - Disclaimer - Privacy