نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

2014
A. Chitra

Data security is in Demand in everyday life of Digital World, since Digital data’s can be reproduced much easily. To achieve the maximum security required a Parallel Processing, User Reconfigurable Cryptographic RISC Microprocessor is proposed in our paper. Rather than protecting the data using tools and external codes, a microprocessor is specially designed in our project to offer maximum digi...

2013
Md Imran Alam

In the era of information technology, security is essential to transmit confidential information (like credit card details, banking transactions etc) over the unsecured network like internet. It is possibility that the information that is being transferred through network of computers or internet being read by other people. For this we need an efficient and secure way to protect our data. Crypt...

Journal: :International Journal of Scientific World 2015

Journal: :International Journal of Engineering & Technology 2018

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2018

Journal: :International Journal of Computer Applications 2015

2012
Sebastian Faust Krzysztof Pietrzak Joachim Schipper

Leakage resilient cryptography attempts to incorporate sidechannel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount of arbitrary information about the schemes internal state. Unfortunately, most leakage resilient schemes are u...

2016
Frederik Armknecht Tetsu Iwata Kaisa Nyberg Bart Preneel

From January 10–15, 2016, the seminar 16021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. It was the fifth in the series of the Dagstuhl seminars “Symmetric Cryptography” held in 2007, 2009, 2012, and 2014. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the pres...

2013
Chandranath Adak

This paper introduces a new concept of textual message encryption and decryption through a pool of randomized symmetric key and the dual layer cryptosystem with the concept of visual cryptography and steganography. A textual message is converted into two image slides, and the images are encrypted through two different randomized sequences of symmetric key. The decryption is done in the reverse ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید