-
1
-
2
PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices
Published 2019-10-01Get full text
Article -
3
Identifying Symmetric-Key Algorithms Using CNN in Intel Processor Trace
Published 2021-10-01Subjects: Get full text
Article -
4
Review on Cryptography Techniques in Network Security
Published 2021-07-01Subjects: Get full text
Article -
5
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
Published 2021-02-01Subjects: Get full text
Article -
6
Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys
Published 2019-06-01Subjects: “…cryptography, symmetric key algorithms, asymmetric key algorithms, affine cipher using asymmetric keys, rectangular matrices…”
Get full text
Article -
7
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Article -
8
Iris template protection based on enhanced hill cipher
Published 2016“…Hill Cipher is a block cipher and symmetric key algorithm it has several advantages such as simplicity, high speed and high throughput can be used to protect Biometric Template. …”
Get full text
Conference or Workshop Item -
9
HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme
Published 2022-10-01“…HybridPKE is based on Ring Learning with Error lattice problem and uses Advance Encryption Standard symmetric-key algorithm. The scheme is non-interactive as both the parties establish the same key without sharing any reconciliation information. …”
Get full text
Article -
10
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Proceeding Paper -
11
Securing Fingerprint Template Using Blockchain and Distributed Storage System
Published 2020-06-01“…The fingerprint is encrypted by the symmetric key algorithm: Advanced Encryption Standard (AES) algorithm and then is uploaded to a symmetrically distributed storage system, the InterPlanetary File system (IPFS). …”
Get full text
Article -
12
Measuring Performances of a White-Box Approach in the IoT Context
Published 2019-08-01“…Moreover, their security is weakened by the fact that smart objects can be placed in unprotected environments, where adversaries are able to play with the symmetric-key algorithm used and the device on which the cryptographic operations are executed. …”
Get full text
Article -
13
Design and Implementation of a Configurable Encryption System for Power-Constrained Devices
Published 2023-01-01“…In this work, we present a configurable encryption system based on the Encryption by Synchronization in a Cellular Automata (ESCA) system, which is a symmetric key algorithm based on the synchronization phenomenon of Cellular Automata with rule-90. …”
Get full text
Article -
14
Energy Efficient Encryption Algorithm for Low Resources Devices
Published 2019-05-01“…For a WSN with constraint computational resources, the cryptosystem based on symmetric key algorithms is extremely suitable for such an agile and dynamic environment. …”
Get full text
Article -
15
Symmetric Key Encryption Based on Rotation-Translation Equation
Published 2020-01-01“…We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key. Symmetric key algorithms use the same key for both encryption and decryption. …”
Get full text
Article -
16
Integrated Protocols to Ensure Security Services in Wireless Sensor Networks
Published 2013-07-01“…The proposed protocols integrate public key and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate security in next generation WSN. …”
Get full text
Article -
17
Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor
Published 2023-11-01“…A principal component within symmetric key algorithms is the substitution box (S-box), which creates confusion between plaintext and ciphertext, enhancing the security of the process. …”
Get full text
Article -
18
Extreme learning machine based sub-key generation for cryptography system
Published 2015“…In addition, it contributes in reducing the risks of breaking the symmetric key algorithms due to the generated independent sub-key in each round. …”
Get full text
Conference or Workshop Item -
19
An efficient construction of key-dependent substitution box based on chaotic sine map
Published 2019-12-01“…A substitution box is a core component of the popular symmetric-key algorithms. However, the major problem of the conventional substitution boxes is the statistic behavior, which is employed as a fixed-size lookup table. …”
Get full text
Article -
20
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
Published 2020-09-01“…ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. …”
Get full text
Article