نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

1999
Josef Pieprzyk Cheng Xin Qu

EÆcient hashing is a centerpiece of modern Cryptography. The progress in computing technology enables us to use 64-bit machines with the promise of 128bit machines in the near future. To exploit fully the technology for fast hashing, we need to be able to design cryptographically strong Boolean functions in many variables which can be evaluated faster using partial evaluations from the previous...

2013
Dilbag Singh Pooja Rani

In today’s age of information technology secure transmission of information is a big challenge. Traditional symmetric and asymmetric methods are not suitable when the needed level of security is high. Hash function based systems are although better than traditional methods but are still inadequate in many cases due to their algorithmic complexity as they need the invertible functions to generat...

Journal: :CoRR 2015
Mohammad Ahmadi Mostafa Vali Farez Moghaddam Aida Hakemi Kasra Madadipouya

Security issues are the most challenging problems in cloud computing environments as an emerging technology. Regarding to this importance, an efficient and reliable user authentication and data protection model has been presented in this paper to increase the rate of reliability cloud-based environments. Accordingly, two encryption procedures have been established in an independent middleware (...

2006
DaeHun Nyang Aziz Mohaisen

Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has been shown that Elliptic Curve Cryptography (ECC) is quite applicable to WSN. Still, PKC is much expensive in terms of computation and memory compared by the Symmetric Key Cryptography (SKC). In addition, in PKC, each public key needs to be authenticated before it’s u...

Journal: :I. J. Network Security 2018
Hongfeng Zhu Rui Wang

Chaos theory has been widely studied and adapted in cryptography for achieving some security mechanisms, such as encryption/decryption, key agreement and hash function. The privacy of using chaos cryptography mostly relies on one of or the combination of three mechanisms: (1) Universal construction symmetric cryptography; (2) Efficient type multiplication in finite field; (3) Prudent operation ...

2006
Wenbo He Ying Huang Klara Nahrstedt Whay C. Lee

In this paper, we study challenges and possible solutions to cryptographic key management in mission-critical networks. Existing symmetric key cryptography mechanisms do not scale well when supporting end-to-end secure and private communication. Existing public key cryptography mechanisms in self-organized ad hoc networks cannot resist a Sybil attack, where a single malicious node presents mult...

2007
Hee-Jin Chae Daniel J. Yeager Joshua R. Smith Kevin Fu

With continuous improvements in the efficiency of microelectronics, it is now possible to power a general-purpose microcontroller wirelessly at a reasonable range. Our implementation of RC5-32/12/16 on the WISP UHF RFID tag shows that conventional cryptography is no longer beyond the reach of a general-purpose UHF tag. In this paper, (1) we provide preliminary experimental data on how much comp...

Journal: :Groups, complexity, cryptology 2022

We study the problems of testing isomorphism polynomials, algebras, and multilinear forms. Our first main results are average-case algorithms for these problems. For example, we develop an algorithm that takes two cubic forms $f, g\in \mathbb{F}_q[x_1,\dots, x_n]$, decides whether $f$ $g$ isomorphic in time $q^{O(n)}$ most $f$. This setting has direct practical implications, having been studied...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید