نتایج جستجو برای: symmetric cryptography
تعداد نتایج: 116835 فیلتر نتایج به سال:
Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting much attention as a solution of the problem of Key Distribution; QKD offers unconditionally secure communicatio...
This paper presents what is the signcryption scheme and shows step-by-step the implementation of the signcryption algorithm. In this paper I provide an overview for the research that has been done so far in signcryption area. Here I also discuss about the extensions for the signcryption scheme and the security in signcryption. 2000 Mathematics Subject Classification:54A05, 54B05. Public key cry...
Abstract—RSA cryptography is an asymmetric communication protocol, and, AES the most used symmetric-key both are facing cryptanalysis attacks.. The famous key exchange protocol Diffie-Hellman; but it has issue of Logjam attack that allows man-in-middle in Diffie-Hellman. Thus, we combine RSA, AES, and Diffie-Hellman algorithm to provide security on called next generationDH or ngDH. Our objectiv...
DNA cryptography is a technology of bio science to encrypt large message in compact volume. Now a day, researchers are going to research in the field of secure data transmission. Hiding the encrypted message is important part of Cryptography. Hidden message is in the form of DNA sequence, image, audio and video, which is used to prevent important data from the intruders. In this paper, a new cr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید