نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

Journal: :Telecommunication Systems 2021

The main issue for the security of wireless sensor networks (WSNs) is how to allow nodes (SNs) establish and share cryptographic keys in an energy-efficient, storage-efficient, authentic manner their secure data transmission. Furthermost recent studies carried out this direction concerned with homogeneous which all has identical characteristics fundamental administration mechanisms. However, Cl...

Journal: :IACR Cryptology ePrint Archive 2012
Reto E. Koenig Rolf Haenni

This paper introduces a special type of symmetric cryptosystem called multi-encryption scheme. It allows users to encrypt multiple plaintexts into a single ciphertext. Each plaintext is protected with its own secret key, meaning that they can be decrypted individually by applying the decryption function with the corresponding key to the ciphertext. Compared to encrypting the ciphertexts one-by-...

2005
Jun ANZAI Tsutomu Matsumoto Junji Shikata Seiichiro Kagei Tomoharu Nagao

Finally, I want to express my deepest gratitude to my wife Chikako, my daughter Tsugumi, and my son Tenga for their support and encouragemet. Abstract The subjects of this thesis are secure key management and secure location management for mobile nodes on wireless mobile networks. Recently, mobile networks become increasingly popular with the widespread availability of cellular phones and noteb...

2009
Dimitris Theodoropoulos Alexandros Siskos Dionisios N. Pnevmatikatos

In this paper, we present CCProc, a flexible cryptography coprocessor for symmetric-key algorithms. Based on an extensive analysis of many symmetric-key ciphers, including the five AES finalists, we designed an Instruction Set Architecture tailored to symmetric-key ciphers and built a hardware processor prototype by using the VHDL language. The design was mapped on FPGAs and ASIC. Results show ...

2003
Qiang Huang Hisashi Kobayashi Bede Liu

Time-sensitive mobile commerce is vulnerable to message authentication delays. Significant power consumption incurred by cryptography is another limiting factor of most mobile devices. In this paper, we present a scalable mobile cryptosystem, which installs a group key and an elliptic curve private/public key pair in each device to enable both symmetric key and public key cryptography. We propo...

Journal: :CoRR 2012
Ramesh Babu George Abraham Kiransinh Borasia

This review is aimed to evaluate the importance of Symmetric Key Cryptography for Security in Distributed Systems. Businesses around the world as well as research and other such areas rely heavily on distributed systems these days. Hence, security is also a major concern due to the openness of the system. Out of the various available security measures, we, in this paper, concentrate in general ...

Journal: :Indian Journal of Data Communication and Networking (IJDCN) 2021

Exercising a collection of similar numerous easy to get sources and resources over the internet is termed as Cloud Computing A storage system basically large scale that consist many independent servers. During recent years huge changes adoption seen in cloud computing so security has become one major concerns it. As works on third party concern there not only for customers but also service prov...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید