Symmetric Key Encryption

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Big-Key Symmetric Encryption: Resisting Key Exfiltration

This paper aims to move research in the bounded retrieval model (BRM) from theory to practice by considering symmetric (rather than public-key) encryption, giving efficient schemes, and providing security analyses with sharp, concrete bounds. The threat addressed is malware that aims to exfiltrate a user’s key. Our schemes aim to thwart this by using an enormously long key, yet paying for this ...

متن کامل

Tree based symmetric key broadcast encryption

The most influential broadcast encryption (BE) scheme till date was introduced in 2001 by Naor, Naor and Lotspiech (NNL) and is based on binary trees. This paper generalizes the ideas of NNL to obtain BE schemes based on k-ary trees for any k ≥ 2. The treatment is uniform across all k and essentially provides a single scheme which is parameterized by the arity of the underlying tree. We perform...

متن کامل

Sparse approach for realizing AVK for Symmetric Key Encryption

Symmetric key cryptography has been a hot topic because of exchange of secure communication through various networks ligand Investigation of reversible XOR like function for symmetric key cryptography has been a big challenge. Moreover it is also desired that the reversible XOR function must be as efficient as traditional XOR. In the literature related to Automatic Variables Key, Fibonacci-Q ma...

متن کامل

The Classification of Quantum Symmetric-Key Encryption Protocols

The classification of quantum symmetric-key encryption protocol is presented. According to five elements of a quantum symmetric-key encryption protocol: plaintext, ciphertext, key, encryption algorithm and decryption algorithm, there are 32 different kinds of them. Among them, 5 kinds of protocols have already been constructed and studied, and 21 kinds of them are proved to be impossible to con...

متن کامل

LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption

We propose a lightweight block cipher that supports 128bit block size with 128-, 192and 256-bit keys, to confirm with the Advanced Encryption Standard (AES) specification. All components of LCASE are chosen to be cellular automata-based so as to achieve higher parallelism and simplify the implementation. Apart from that, the other virtues of LCASE are its high speed and cheap cost along with be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of The Institute of Image Information and Television Engineers

سال: 2015

ISSN: 1342-6907,1881-6908

DOI: 10.3169/itej.69.553