Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed these algorithms at risk as they enable the implement...
Main Authors: | Basel Halak, Yildiran Yilmaz, Daniel Shiu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9835713/ |
Similar Items
-
Optimization of the symmetric encryption mode ECB dedicated to securing medical data
by: SEGHIRI Naouel, et al.
Published: (2021-05-01) -
Proposal to Generate a Various Key from Image for Various Encryption Methods
by: Shatha Habeeb, et al.
Published: (2013-01-01) -
Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices
by: Huawei Huang
Published: (2022-11-01) -
Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
by: Foteini Baldimtsi, et al.
Published: (2021-05-01) -
A Lightweight and Flexible Encryption Scheme to Protect Sensitive Data in Smart Building Scenarios
by: Salvador Perez, et al.
Published: (2018-01-01)