نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

2005
Haodong Wang Bo Sheng Qun Li

Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that public key scheme is not practical for sensor networks, this paper describes a public-key implementation in a sensor netwo...

2000
Paulo Simões Pedro Alves José Rogado Paulo Ferreira

Currently, most of e-commerce applications rely on asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper argues that the existing authentication protocols, based on asymmetric cryptography, are not appropriate for such devices due to their limit...

2012
Fábio Borges Albrecht Petzoldt Renato Portugal

Systems of Multivariate Quadratic Equations (M Q ) are important in cryptography due to the resistance against attacks that will arise with the advent of quantum computing. Resistant algorithms against attacks based on quantum computing are called post-quantum cryptography. Unbalanced OilVinegar (UOV) is a well known post-quantum signature scheme based on M Q . This paper presents a variation o...

Journal: :IACR Cryptology ePrint Archive 2013
Mitsugu Iwamoto Junji Shikata

In this paper, information theoretic cryptography is discussed based on conditional Rényi entropies. Our discussion focuses not only on cryptography but also on the definitions of conditional Rényi entropies and the related information theoretic inequalities. First, we revisit conditional Rényi entropies, and clarify what kind of properties are required and actually satisfied. Then, we propose ...

Journal: :Jurnal Riset Mahasiswa Matematika 2023

Cryptography is widely used to overcome information security problems that are exchanged on the internet network. One of algorithms in cryptography Vigenere Cipher, algorithm known as a robust method and not easily solved. However, Cipher has weakness, namely key short repeatedly. Therefore, it necessary modify Cipher. The purpose this study determine modification using symmetric group also lev...

2007
Gavin Lowe

Digital certificates (through the use of publickey cryptography) provide an entity the power to authenticate users even when the CA (Certification Authority) that issued the certificate is not on line. This authentication mechanism is widely used today in Virtual Organizations (VOs) to distribute the weight of the authentication. However, as shown in this paper, the use of public-key cryptograp...

2005
Haodong Wang Bo Sheng Qun Li

Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that public key scheme is not practical for sensor networks, this paper describes a public-key implementation in a sensor netwo...

2015
Jelili Oyelade Olufunke Oladipupo

In the past, Cryptography was used in keeping military information, diplomatic correspondence secure and in protection of national security. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations. This is used to ensure t...

Journal: :International Journal of Advanced Science and Technology 2019

2016
Rajesh S. Gavaskar A. Sumithra

Security remains as a big challenge as there are many advancements as well as applications being proposed in the areas wireless adhoc networks and cloud computing. The modern field of cryptography is divided into two main areas based on the basic encryption mechanism as symmetric key cryptography and Public-key cryptography. Symmetric-key cryptosystems use the same key for encryption and decryp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید