نتایج جستجو برای: symmetric key

تعداد نتایج: 629241  

2018
James Renshaw

We consider an application to the discrete log problem using completely regular semigroups which may provide a more secure symmetric cryptosystem than the classic system based on groups. In particular we describe a scheme that would appear to offer protection to a standard trial multiplication attack.

2011
Gabriela Moise

In cryptography, a Substitution box (S-box) is one of the basic components of a symmetric key cryptography. Generally, it transforms a number of m input bits into n output bits. In this paper, there are presented the cryptographic properties of S-boxes and it is introduced a knowledge-based schema for building S-boxes.

Journal: :IJDSN 2008
Jian Yin Sanjay Kumar Madria

In this paper, we present an Energy Efficient Secure Routing Protocol for Sensor Networks (ESecRout). The protocol uses the symmetric cryptography to secure messages, and uses a small cache in sensor nodes to record the partial routing path (previous and next nodes) to the destination. It guarantees that the destination will be able to identify and discard the tampered messages and ensure that ...

Journal: :CoRR 2006
Maruti Satti

This paper presents a quasigroup encryptor that has very good data-scrambling properties and, therefore, it has potential uses in symmetric cryptography. The purpose of the scrambler is to maximize the entropy at the output, even in cases where the input is constant. The great complexity associated with the task of finding the scrambling transformation ensures the effectiveness of the encryptio...

Journal: :Inf. Process. Lett. 2008
Ulrich Kühn

Remotely keyed encryption (RKE) schemes provide fast symmetric encryption and decryption using a small-bandwidth security module and a powerful host. Such schemes keep the key inside the security module to prevent key compromise. Shin, Shin, and Rhee proposed a length-preserving as well as a length-increasing RKE scheme that both use only a single round of interaction between host and security ...

Journal: :IEICE ESS Fundamentals Review 2016

Journal: :Procedia Computer Science 2016

Journal: :IJSN 2007
Leonardo B. Oliveira Hao Chi Wong Antonio Alfredo Ferreira Loureiro Ricardo Dahab

Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we propose a solution for securing heterogeneous hierarchical WSNs with an arbitrary number of levels. Our solution relies exclusively on symmetric key schemes, is highly distributed, and takes into account node interacti...

Journal: :CoRR 2017
Irina Pashchenko

This work describes an example of an application of a novel method for symmetric cryptography. Its purpose is to show how a regular message can be encrypted and then decrypted in an easy, yet secure way. The encrypting method introduced in this work is different from others because it involves decimals as well as integers, encrypting the same initial message differently every time, and insertin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید