نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

Journal: :Future Internet 2011
Helena Rifà-Pous Jordi Herrera-Joancomartí

Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launchin...

2009
Maricel O. Balitanas

Potentially large number of cryptography solutions to attain security is widely known and recognized. Looking for a stronger scheme is the aim of most researchers to hide valuable information from each other. In this information age, many encryption algorithm exist to help keep information secure and these algorithms vary in complexity and ability to resist cracking. In this paper we present a ...

2013
Hafid Mammass

we treat in this paper a secure authentication method using watermarking, smart card and cryptography. It can serve to control logical and physical access and the network access and to prove the card owner identity.This method is very secure because the high level of security of smart card, the method of watermarking and detection and the complexity of the algorithm RSA and DES aim to remove th...

2008
Michal VARCHOLA

The paper describes security algorithms and protocols provided by recent WSN stacks where symmetric-key schemes are commonly used. Using these schemes seems to be impractical in large scale networks; hence the paper intends their replacement by public-key schemes for mentioned low cost and low power MCU platforms. Moreover, the paper proposes implementation of Wireless Sensor Network (WSN) stac...

2011
Nagesh Kumar Jawahar Thakur Arvind Kalia

Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed ...

2013
Mohammed Hassouna Nashwa Mohamed Bazara Barry Eihab Bashier

Most of the existing mailing systems provide limited authentication mechanisms, including web trust model, password authentication or identity based cryptography. Few existing mailing systems found in the literature provide strong authentication based on public key infrastructure (PKI). However, PKI based-systems generally suffer from certificate management and scalability problems. This paper ...

2014
Li Yang

This paper discusses white box cryptography, which is used to protect the key from white box attack. Previously white box cryptography was applied to symmetric key encryption, which does provide protection mechanism to the key, but affects the performance and is considered difficult to update the key. The scheme proposed by the researcher mentions White Box AES and improves its low performance ...

Journal: :IACR Cryptology ePrint Archive 2013
Cécile Delerablée Tancrède Lepoint Pascal Paillier Matthieu Rivain

White-box cryptography has attracted a growing interest from researchers in the last decade. Several white-box implementations of standard block-ciphers (DES, AES) have been proposed but they have all been broken. On the other hand, neither evidence of existence nor proofs of impossibility have been provided for this particular setting. This might be in part because it is still quite unclear wh...

Journal: :JCP 2011
Kavitha Ammayappan Atul Negi V. N. Sastry Ashok Kumar Das

Mobile ad hoc networks (MANETs) are known to be unprotected due to the nature of message propagation and the openness of public channel. Another important characteristic of MANETs is their being basically energy constrained. While it is known that symmetric key cryptography provides a high degree of secrecy and efficiency, but has a number of significant difficulties for the MANET domain in key...

2012
Anshul Sharma Sunil Agrawal T. Hofmeister M. Krause C. Blundo A. De Santis D. R. Stinson

Visual cryptography encodes a secret binary image (SI) into shares of random binary patterns. The decoding process of a visual cryptography scheme, which differs from traditional secret sharing, does not need any cryptographic algorithms like symmetric and asymmetric algorithms. Visual cryptography is based on the images and is obtained by sending pixel information and stacking of pixels for re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید