Showing 1 - 20 results of 24 for search '"symmetric-key algorithm"', query time: 0.24s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys by Maxrizal Maxrizal, Baiq Desy Aniska Prayanti

    Published 2019-06-01
    Subjects: “…cryptography, symmetric key algorithms, asymmetric key algorithms, affine cipher using asymmetric keys, rectangular matrices…”
    Get full text
    Article
  7. 7

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
    Get full text
    Article
  8. 8

    Iris template protection based on enhanced hill cipher by Khalaf, Emad Taha, Mohammed, Muamer N., Norrozila, Sulaiman

    Published 2016
    “…Hill Cipher is a block cipher and symmetric key algorithm it has several advantages such as simplicity, high speed and high throughput can be used to protect Biometric Template. …”
    Get full text
    Conference or Workshop Item
  9. 9

    HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme by Simran Choudhary, Anil Gupta

    Published 2022-10-01
    “…HybridPKE is based on Ring Learning with Error lattice problem and uses Advance Encryption Standard symmetric-key algorithm. The scheme is non-interactive as both the parties establish the same key without sharing any reconciliation information. …”
    Get full text
    Article
  10. 10

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
    Get full text
    Proceeding Paper
  11. 11

    Securing Fingerprint Template Using Blockchain and Distributed Storage System by Moses Arhinful Acquah, Na Chen, Jeng-Shyang Pan, Hong-Mei Yang, Bin Yan

    Published 2020-06-01
    “…The fingerprint is encrypted by the symmetric key algorithm: Advanced Encryption Standard (AES) algorithm and then is uploaded to a symmetrically distributed storage system, the InterPlanetary File system (IPFS). …”
    Get full text
    Article
  12. 12

    Measuring Performances of a White-Box Approach in the IoT Context by Daniele Giacomo Vittorio Albricci, Michela Ceria, Federico Cioschi, Nicolò Fornari, Arvin Shakiba, Andrea Visconti

    Published 2019-08-01
    “…Moreover, their security is weakened by the fact that smart objects can be placed in unprotected environments, where adversaries are able to play with the symmetric-key algorithm used and the device on which the cryptographic operations are executed. …”
    Get full text
    Article
  13. 13

    Design and Implementation of a Configurable Encryption System for Power-Constrained Devices by J. D. J. De La Rosa-De La Rosa, J. S. Murguia, M. Mejia-Carlos, Miguel Angel Lastras-Montano

    Published 2023-01-01
    “…In this work, we present a configurable encryption system based on the Encryption by Synchronization in a Cellular Automata (ESCA) system, which is a symmetric key algorithm based on the synchronization phenomenon of Cellular Automata with rule-90. …”
    Get full text
    Article
  14. 14

    Energy Efficient Encryption Algorithm for Low Resources Devices by Bassam W. Aboshosha, Mohamed M. Dessouky, Ayman Elsayed

    Published 2019-05-01
    “…For a WSN with constraint computational resources, the cryptosystem based on symmetric key algorithms is extremely suitable for such an agile and dynamic environment. …”
    Get full text
    Article
  15. 15

    Symmetric Key Encryption Based on Rotation-Translation Equation by Borislav Stoyanov, Gyurhan Nedzhibov

    Published 2020-01-01
    “…We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key. Symmetric key algorithms use the same key for both encryption and decryption. …”
    Get full text
    Article
  16. 16

    Integrated Protocols to Ensure Security Services in Wireless Sensor Networks by Mohammed Faisal, Jalal Al-Muhtadi, Abdullah Al-Dhelaan

    Published 2013-07-01
    “…The proposed protocols integrate public key and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate security in next generation WSN. …”
    Get full text
    Article
  17. 17

    Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor by Erendira Corona-Bermúdez, Juan Carlos Chimal-Eguía, Uriel Corona-Bermúdez, Mario Eduardo Rivero-Ángeles

    Published 2023-11-01
    “…A principal component within symmetric key algorithms is the substitution box (S-box), which creates confusion between plaintext and ciphertext, enhancing the security of the process. …”
    Get full text
    Article
  18. 18

    Extreme learning machine based sub-key generation for cryptography system by Atee, Hayfaa Abdulzahra, Ahmad, Robiah, Mohd. Noor, Norliza, Rahma, Abdul Monem S.

    Published 2015
    “…In addition, it contributes in reducing the risks of breaking the symmetric key algorithms due to the generated independent sub-key in each round. …”
    Get full text
    Conference or Workshop Item
  19. 19

    An efficient construction of key-dependent substitution box based on chaotic sine map by Muhammad Usama, Osama Rehman, Imran Memon, Safdar Rizvi

    Published 2019-12-01
    “…A substitution box is a core component of the popular symmetric-key algorithms. However, the major problem of the conventional substitution boxes is the statistic behavior, which is employed as a fixed-size lookup table. …”
    Get full text
    Article
  20. 20

    Analytical Study of Hybrid Techniques for Image Encryption and Decryption by Chiranji Lal Chowdhary, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, Muhammad Fazal Ijaz

    Published 2020-09-01
    “…ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. …”
    Get full text
    Article