نتایج جستجو برای: symmetric cryptography
تعداد نتایج: 116835 فیلتر نتایج به سال:
Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that public key scheme is not practical for sensor networks, this paper describes a public-key implementation in a sensor netwo...
Currently, most of e-commerce applications rely on asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper argues that the existing authentication protocols, based on asymmetric cryptography, are not appropriate for such devices due to their limit...
Systems of Multivariate Quadratic Equations (M Q ) are important in cryptography due to the resistance against attacks that will arise with the advent of quantum computing. Resistant algorithms against attacks based on quantum computing are called post-quantum cryptography. Unbalanced OilVinegar (UOV) is a well known post-quantum signature scheme based on M Q . This paper presents a variation o...
In this paper, information theoretic cryptography is discussed based on conditional Rényi entropies. Our discussion focuses not only on cryptography but also on the definitions of conditional Rényi entropies and the related information theoretic inequalities. First, we revisit conditional Rényi entropies, and clarify what kind of properties are required and actually satisfied. Then, we propose ...
Cryptography is widely used to overcome information security problems that are exchanged on the internet network. One of algorithms in cryptography Vigenere Cipher, algorithm known as a robust method and not easily solved. However, Cipher has weakness, namely key short repeatedly. Therefore, it necessary modify Cipher. The purpose this study determine modification using symmetric group also lev...
Digital certificates (through the use of publickey cryptography) provide an entity the power to authenticate users even when the CA (Certification Authority) that issued the certificate is not on line. This authentication mechanism is widely used today in Virtual Organizations (VOs) to distribute the weight of the authentication. However, as shown in this paper, the use of public-key cryptograp...
Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that public key scheme is not practical for sensor networks, this paper describes a public-key implementation in a sensor netwo...
In the past, Cryptography was used in keeping military information, diplomatic correspondence secure and in protection of national security. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations. This is used to ensure t...
Security remains as a big challenge as there are many advancements as well as applications being proposed in the areas wireless adhoc networks and cloud computing. The modern field of cryptography is divided into two main areas based on the basic encryption mechanism as symmetric key cryptography and Public-key cryptography. Symmetric-key cryptosystems use the same key for encryption and decryp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید