نتایج جستجو برای: symmetric key

تعداد نتایج: 629241  

Journal: :CoRR 2013
Hugues Randriambololona

In this text we develop the formalism of products and powers of linear codes under componentwise multiplication. As an expanded version of the author’s talk at AGCT-14, focus is put mostly on basic properties and descriptive statements that could otherwise probably not fit in a regular research paper. On the other hand, more advanced results and applications are only quickly mentioned with refe...

2011
A.L.Narasimha Rao Kakoli Rao

Unified semantic archetypes have led to many practical advances, including symmetric encryption and widearea networks. In this work, we argue the development of replication, which embodies the extensive principles of e-voting technology. Our focus in this position paper is not on whether sensor networks and Scheme can connect to answer this quandary, but rather on exploring an analysis of link-...

2011
Martin Stanek

We propose (T,N) multi-ciphertext scheme for symmetric encryption. The scheme encrypts a message into N distinct ciphertexts. The knowledge of the symmetric key allows decryption of the original message from any ciphertext. Moreover, knowing T + 1 ciphertexts allows efficient recovery of the original message without the key, and without revealing the key as well. We define the security property...

Journal: :CoRR 2007
Maryna Olexandrivna Nesterenko Jiri Patera Dmytro Zhavrotskyj

A symmetric encryption method based on properties of quasicrystals is proposed. The advantages of the cipher are strict aperiodicity and everywhere discontinuous property as well as the speed of computation, simplicity of implementation and a straightforward possibility of extending the method to encryption of higher dimensional data.

2007
Alireza A. Nezhad Dimitrios Makrakis Ali Miri

In this paper, a routing protocol is proposed that provides location privacy for the source and the destination as well as user anonymity and unlinkability in multihop wireless sensor networks. The sink is assumed to be computationally powerful and responsible for all routing decisions. It assigns incoming and outgoing labels to nodes in the uplink and downlink directions. Each node is only awa...

Journal: :CoRR 2009
Amin Daneshmand Malayeri Jalal Abdollahi

Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper. Security-based networks and some complex technologies such as RFID and parallel security settings has b...

2016
Frederik Armknecht Tetsu Iwata Kaisa Nyberg Bart Preneel

From January 10–15, 2016, the seminar 16021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. It was the fifth in the series of the Dagstuhl seminars “Symmetric Cryptography” held in 2007, 2009, 2012, and 2014. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the pres...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید