نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

Journal: :international journal of group theory 2015
claude carlet yin tan

we give a survey of recent applications of group rings to combinatorics and tocryptography, including their use in the di erential cryptanalysis of block ciphers.

Journal: :CoRR 2009
Amin Daneshmand Malayeri Jalal Abdollahi

Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper. Security-based networks and some complex technologies such as RFID and parallel security settings has b...

2018
Vasileios Mavroeidis Kamer Vishi Mateusz D. Zych Audun Josang

The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s ...

Journal: :International Journal of Interactive Multimedia and Artificial Intelligence 2019

Journal: :DEStech Transactions on Computer Science and Engineering 2017

Journal: :Science in China Series G: Physics, Mechanics and Astronomy 2009

2014
Vikas Agrawal Shruti Agrawal Rajesh Deshmukh

The Process of Encryption and Decryption is performed by using Symmetric key cryptography and public key cryptography for Secure Communication. In this paper, we studied that how the process of Encryption and Decryption is perform in case of Symmetric key and public key cryptography using AES and DES algorithms and modified RSA algorithm.

2011
Yogesh Kumar Rajiv Munjal Harsh Sharma

Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises of brief descr...

Journal: :IACR Cryptology ePrint Archive 2004
Waldyr D. Benits Routo Terada

We present a variant of the Boneh & Franklin Identiybased Encryption IBE scheme to derive an authenticated symmetric key-exchange protocol, when combined with a signature scheme. Our protocol uses IBE as a secure channel to establish a symmetric key between two users and, after that, further communication can be done by symmetric cryptography, much faster than pairing-based cryptography.

Journal: :CoRR 2014
Arjun Puri Sudesh Kumar

Cryptography is the science of encrypting the information so that it is rendered unreadable for an intruder. Cryptographic techniques are of utmost importance in today’s world as the information to be sent might be of invaluable importance to both the sender and the receiver. Various cryptographic techniques ensure that even if an intruder intercepts the sent information, he is not able to deci...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید