نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

Journal: :CoRR 2007
Maryna Olexandrivna Nesterenko Jiri Patera Dmytro Zhavrotskyj

A symmetric encryption method based on properties of quasicrystals is proposed. The advantages of the cipher are strict aperiodicity and everywhere discontinuous property as well as the speed of computation, simplicity of implementation and a straightforward possibility of extending the method to encryption of higher dimensional data.

2007
Alireza A. Nezhad Dimitrios Makrakis Ali Miri

In this paper, a routing protocol is proposed that provides location privacy for the source and the destination as well as user anonymity and unlinkability in multihop wireless sensor networks. The sink is assumed to be computationally powerful and responsible for all routing decisions. It assigns incoming and outgoing labels to nodes in the uplink and downlink directions. Each node is only awa...

1997
Annette Huber

Generalizing ideas of Anderson, Harder has proposed a construction of extensions of motives of Dirichlet-Tate type in sheaf theoretic terms (cf. [Ha] Section 4.2 or the review before Prop. 6.4). Let Mk(−1) be the smooth ladic sheaf on Y1(p) given as k-th symmetric power of the Tate module of the universal elliptic curve over Y1(p). Decomposing a certain l-adic cohomology group with coefficients...

Journal: :CoRR 2017
Irina Pashchenko

This work describes an example of an application of a novel method for symmetric cryptography. Its purpose is to show how a regular message can be encrypted and then decrypted in an easy, yet secure way. The encrypting method introduced in this work is different from others because it involves decimals as well as integers, encrypting the same initial message differently every time, and insertin...

Journal: :Computers, materials & continua 2023

Many organizations have insisted on protecting the cloud server from outside, although risks of attacking are mostly inside. There many algorithms designed to protect attacks that been able attacks. Still, attackers even better mechanisms break these security algorithms. Cloud cryptography is best data protection algorithm exchanges between authentic users. In this article, one symmetric will b...

Journal: :International Journal of Innovative Research in Science, Engineering and Technology 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید