Showing 1 - 5 results of 5 for search '"Symmetric-key algorithm"', query time: 0.05s Refine Results
  1. 1

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
    Get full text
    Article
  2. 2

    Iris template protection based on enhanced hill cipher by Khalaf, Emad Taha, Mohammed, Muamer N., Norrozila, Sulaiman

    Published 2016
    “…Hill Cipher is a block cipher and symmetric key algorithm it has several advantages such as simplicity, high speed and high throughput can be used to protect Biometric Template. …”
    Get full text
    Conference or Workshop Item
  3. 3

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
    Get full text
    Proceeding Paper
  4. 4

    Depth-optimized quantum circuits for ASCON: AEAD and HASH † by Oh, Yujin, Jang, Kyungbae, Baksi, Anubhab, Seo, Hwajeong

    Published 2024
    “…As far as we know, this is the first implementation of a quantum circuit for the ASCON AEAD (Authenticated Encryption with Associated Data) scheme, which is a symmetric-key algorithm. Also, our quantum circuit implementation of the ASCON-HASH achieves a reduction of more than 88.9% in the Toffoli depth and more than 80.5% in the full depth compared to the previous work. …”
    Get full text
    Journal Article
  5. 5

    Classical and physical security of symmetric key cryptographic algorithms by Baksi, Anubhab

    Published 2021
    “…Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Attack. …”
    Get full text
    Thesis-Doctor of Philosophy