Výsledky vyhľadávania - "Symmetric-key algorithm"
-
1
Autori: a ďalší
Prispievatelia: a ďalší
Zdroj: Proceedings on Privacy Enhancing Technologies, 2023 (1)
Predmety: Secure Multi-party Computation, 0301 basic medicine, Conjunctive and disjunctive queries, Encryption, Cryptographic primitive, Cryptographic protocol, Search engine, Mathematical analysis, Searchable Encryption, Database, 03 medical and health sciences, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Boolean function, FOS: Mathematics, Information retrieval, Relational database, Authenticated Encryption, Attribute-Based Encryption, Cryptography and Error-Correcting Codes, Scheme (mathematics), Computer network, 0303 health sciences, Advanced Cryptographic Schemes and Protocols, Symmetric-key algorithm, Query by Example, Scalability, Boolean conjunctive query, Public-key cryptography, Computer science, Conjunctive query, Distributed computing, Boolean queries, Algorithm, Database encryption, Searchable encryption, Encrypted search, Computer Science, Physical Sciences, Cryptography, Web search query, Homomorphic Encryption, Mathematics
Popis súboru: application/application/pdf
Prístupová URL adresa: http://hdl.handle.net/20.500.11850/568666
-
2
Autori:
Zdroj: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
Predmety: LDPC, Computer engineering. Computer hardware, Post-quantum cryptography, Encryption, Key encapsulation, Information technology, 0102 computer and information sciences, 02 engineering and technology, Speech recognition, 01 natural sciences, TK7885-7895, Cryptanalysis of Block Ciphers and Hash Functions, NIST, constant-time decoding, Artificial Intelligence, 0202 electrical engineering, electronic engineering, information engineering, BIKE, Block Ciphers, Cryptography and Error-Correcting Codes, Computer network, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, MDPC, Public-key cryptography, T58.5-58.64, Computer science, Programming language, Algorithm, Decoding Algorithms, Color Image Encryption, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition, Decoding methods, Error-Correcting Codes, Constant (computer programming)
-
3
Autori: a ďalší
Zdroj: IEEE Access, Vol 10, Pp 132908-132916 (2022)
Predmety: Encryption, 02 engineering and technology, Biochemistry, Quantum mechanics, Gene, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Entropy (arrow of time), Cipher, Block cipher, fractional transformation, Cryptography and Error-Correcting Codes, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Physics, block cipher, Differential Cryptanalysis, image encryption, Public-key cryptography, Computer science, TK1-9971, Algorithm, substitution box, Chemistry, Operating system, Computer Science, Physical Sciences, Cryptography, Transformation (genetics), Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, AES algorithm, S-box, Mathematics
Prístupová URL adresa: https://doaj.org/article/c0c2fdc026af4d3489fbb32893cc919a
-
4
Autori:
Zdroj: Lightweight Cryptographic Techniques and Cybersecurity Approaches ISBN: 9781803557328
Lightweight Cryptographic Techniques and Cybersecurity ApproachesPredmety: Image Encryption, Robustness (evolution), Encryption, Key encapsulation, Robust Hashing, Biochemistry, Gene, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, Computer engineering, Key (lock), Cryptosystem, Chaos-based Image Encryption Techniques, Digital Image Watermarking Techniques, Symmetric-key algorithm, Public-key cryptography, Hybrid cryptosystem, Computer science, Elliptic curve cryptography, Advanced Encryption Standard, Chemistry, Color Image Encryption, Image Authentication, Computer Science, Physical Sciences, Hash function, Optical Encryption, Cryptography, Computer Vision and Pattern Recognition
-
5
Autori: a ďalší
Zdroj: IEEE Access, Vol 8, Pp 160433-160449 (2020)
Predmety: FOS: Computer and information sciences, Image Encryption, Artificial intelligence, Chaotic Maps, Chaotic, Hénon map, Ciphertext, Encryption, 02 engineering and technology, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, Image (mathematics), 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Chaos-based Image Encryption Techniques, Symmetric-key algorithm, image encryption, Public-key cryptography, Plaintext, Computer science, Throughput, TK1-9971, Probabilistic encryption, Algorithm, Color Image Encryption, Applications of Elliptic Curve Cryptography in Security, Computer Science, Physical Sciences, Cryptography, Telecommunications, Wireless, Bijective substitution box, Computer vision, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, chaotic map, Information Systems
-
6
Autori: a ďalší
Zdroj: IEEE Access, Vol 8, Pp 104432-104444 (2020)
Predmety: Artificial intelligence, random key, Chaotic, Encryption, security, 02 engineering and technology, Random number generation, Engineering, NIST, Computer security, Theory and Applications of Cellular Automata, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Computer network, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Electronic engineering, Natural language processing, CMOS, Chaos Synchronization and Control in Complex Systems, Random Number Generator, Statistical and Nonlinear Physics, Public-key cryptography, one-time pad encryption, Computer science, TK1-9971, Key space, Algorithm, true random number generator, Color Image Encryption, Physics and Astronomy, Computational Theory and Mathematics, Computer Science, Physical Sciences, Cryptography, Chaos, Pseudorandom number generator, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition
-
7
Autori: a ďalší
Zdroj: IEEE Access, Vol 8, Pp 75473-75490 (2020)
Predmety: Permutation (music), Robustness (evolution), Encryption, 02 engineering and technology, Substitution-boxes, Biochemistry, Gene, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Cryptosystem, Cryptography and Error-Correcting Codes, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Physics, Acoustics, coset graphs, Discrete mathematics, Public-key cryptography, Substitution (logic), Computer science, TK1-9971, Programming language, Algorithm, Chemistry, block ciphers, Computer Science, Physical Sciences, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, modular symmetric group, Permutation group, Mathematics, Coset
Prístupová URL adresa: https://ieeexplore.ieee.org/ielx7/6287639/8948470/09076049.pdf
https://doaj.org/article/ba4e4a513dd542e4a50f74d8710523d5
https://dblp.uni-trier.de/db/journals/access/access8.html#RazaqAAYSAA20
https://doi.org/10.1109/ACCESS.2020.2989676
https://ieeexplore.ieee.org/document/9076049/ -
8
Autori: a ďalší
Zdroj: IEEE Access, Vol 8, Pp 107993-108003 (2020)
Predmety: FOS: Computer and information sciences, Smart Cards, Computer Networks and Communications, User Authentication Methods and Security Measures, Encryption, Remote User Authentication, 02 engineering and technology, Password, Server, Computer security, Authentication and key-agreement (AKA), 0202 electrical engineering, electronic engineering, information engineering, multi-server authentication, Smart card, fuzzy commitment scheme, Security Protocols for Authentication and Key Exchange, e-healthcare, Authentication, Computer network, Security analysis, Symmetric-key algorithm, Graphical Passwords, Scalability, Biometric Recognition and Security Systems, Public-key cryptography, Computer science, TK1-9971, AVISPA tool, telecare medicine information system (TMIS), Operating system, Authentication (law), Computer Science, Physical Sciences, Signal Processing, Electrical engineering. Electronics. Nuclear engineering, Passwords, Session key, Information Systems
Popis súboru: application/pdf
-
9
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
Autori: a ďalší
Zdroj: IEEE Access, Vol 8, Pp 26107-26118 (2020)
Predmety: Computer Networks and Communications, Internet of Things, Ciphertext, Encryption, Cryptographic primitive, 02 engineering and technology, Cryptographic protocol, Mathematical analysis, Searchable Encryption, Server, Artificial Intelligence, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing, Attribute-Based Encryption, Scheme (mathematics), Security Protocols for Authentication and Key Exchange, Computer network, Identity-Based Encryption, Elliptic Curve Cryptography, Advanced Cryptographic Schemes and Protocols, Symmetric-key algorithm, Public-key cryptography, Computer science, TK1-9971, 3. Good health, World Wide Web, Attribute-based encryption, Operating system, Attribute-based, Computer Science, Physical Sciences, Cryptography, eHealth, Electrical engineering. Electronics. Nuclear engineering, Security in Wireless Sensor Networks, searchable encryption, Homomorphic Encryption, decryptable, The Internet, Mathematics
-
10
Autori:
Predmety: Authentication, Plain password, Cryptographic hash function, Encrypted negative password, Symmetric key algorithm
Relation: https://zenodo.org/communities/amaljyothi/; https://zenodo.org/records/5105435; oai:zenodo.org:5105435; https://doi.org/10.5281/zenodo.5105435
-
11
Autori: a ďalší
Zdroj: Menoufia Journal of Electronic Engineering Research. 28:374-380
Predmety: Image Encryption, Internet of Things, Encryption, FOS: Mechanical engineering, 7. Clean energy, Lightweight Ciphers, Cryptanalysis of Block Ciphers and Hash Functions, Engineering, Artificial Intelligence, Constraint (computer-aided design), Embedded system, Cryptography and Error-Correcting Codes, Computer network, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Public-key cryptography, Computer science, Distributed computing, Mechanical engineering, Algorithm, Operating system, Computer Science, Physical Sciences, Cryptography, Optical Encryption, Wireless, Computer Vision and Pattern Recognition
Prístupová URL adresa: https://mjeer.journals.ekb.eg/article_67379.html
-
12
Autori: a ďalší
Zdroj: Menoufia Journal of Electronic Engineering Research. 28:381-387
Predmety: Ciphertext, Encryption, Lightweight Ciphers, Optical Code Division Multiple Access, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Engineering, Theoretical computer science, Artificial Intelligence, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Electrical and Electronic Engineering, Linear cryptanalysis, Cryptography and Error-Correcting Codes, Symmetric-key algorithm, Public-key cryptography, Plaintext, Computer science, Algorithm, Decoding Algorithms, Computer Science, Physical Sciences, Cryptography, Security Analysis, Mathematics
Prístupová URL adresa: https://mjeer.journals.ekb.eg/article_67380.html
-
13
Autori: a ďalší
Zdroj: Menoufia Journal of Electronic Engineering Research. 28:361-368
Predmety: Encryption, Geometry, 7. Clean energy, Lightweight Ciphers, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, FOS: Mathematics, Cipher, Block cipher, Cryptography and Error-Correcting Codes, Chaos-based Image Encryption Techniques, Arithmetic, Symmetric-key algorithm, Public-key cryptography, Computer science, Algorithm, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition, GOST (hash function), S-box, Block (permutation group theory), Mathematics
Prístupová URL adresa: https://mjeer.journals.ekb.eg/article_67378.html
https://journals.ekb.eg/article_67378.html -
14
Autori:
Prispievatelia:
Zdroj: Ingeniería y Ciencia, Vol 15, Iss 29 (2019)
Universidad EAFIT
Repositorio Institucional Universidad EAFIT
Ingeniería y Ciencia; Vol 15, No 29 (2019)
Repositorio EAFIT
instacron:Universidad EAFIT
Ingeniería y Ciencia, Volume: 15, Issue: 29, Pages: 103-125, Published: JUN 2019Predmety: Technology, Science (General), Performance, algoritmo, clave simétrica, Encryption, 02 engineering and technology, Q1-390, Cryptanalysis of Block Ciphers and Hash Functions, Computer security, Criptografía, Algoritmo, 0202 electrical engineering, electronic engineering, information engineering, RC5, Cryptography and Error-Correcting Codes, Key generation, Computer network, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Programming language, Algorithm, Physical Sciences, Clave Simétrica, symmetric key, Reduction (mathematics), Computer Vision and Pattern Recognition, Key size, rendimiento, performance, Science, Geometry, Key encapsulation, Artificial Intelligence, FOS: Mathematics, Symmetric Key, Key (lock), Block cipher, algorithm, Rendimiento, Public-key cryptography, Computer science, Implementation, Computer Science, Cryptography, Block (permutation group theory), Mathematics, Rc5
Popis súboru: application/pdf; text/html
Prístupová URL adresa: https://publicaciones.eafit.edu.co/index.php/ingciencia/article/download/5474/4404
https://doaj.org/article/f7d38903e4ff4f55ace6d422fac6dba9
https://dialnet.unirioja.es/servlet/articulo?codigo=6955074
https://repository.eafit.edu.co/handle/10784/14376?locale-attribute=en
http://www.scielo.org.co/scielo.php?script=sci_arttext&pid=S1794-91652019000100103
http://www.scielo.org.co/pdf/ince/v15n29/1794-9165-ince-15-29-103.pdf
https://dialnet.unirioja.es/descarga/articulo/6955074.pdf
https://melpomene.eafit.edu.co/index.php/ingciencia/article/view/5474
http://hdl.handle.net/10784/14376
http://www.scielo.org.co/scielo.php?script=sci_arttext&pid=S1794-91652019000100103&lng=en&tlng=en -
15
Autori:
Predmety: Image Encryption, Encryption, Key management, 7. Clean energy, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, Computer security, Key (lock), Wireless network, Key distribution in wireless sensor networks, Computer network, Key generation, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Public-key cryptography, Computer science, Key distribution, Distributed computing, Advanced Encryption Standard, Color Image Encryption, Computer Science, Physical Sciences, Cryptography, Wireless, Telecommunications, Computer Vision and Pattern Recognition, Wireless sensor network
-
16
Autori:
Zdroj: International Journal of Organizational and Collective Intelligence. 7:83-93
Predmety: Image Encryption, AES implementations, Encryption, Geometry, 02 engineering and technology, Biochemistry, Gene, Database, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Encryption software, Authenticated Encryption, Key (lock), Embedded system, Block cipher, Cryptography and Error-Correcting Codes, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Row and column spaces, Public-key cryptography, Hardware Implementations, Computer science, Field-programmable gate array, Algorithm, Advanced Encryption Standard, Chemistry, Color Image Encryption, Row, Computer Science, Physical Sciences, Transformation (genetics), Telecommunications, Security Analysis, 56-bit encryption, Computer Vision and Pattern Recognition, Column (typography), S-box, Block (permutation group theory), Mathematics, Frame (networking)
-
17
Autori: a ďalší
Zdroj: Sci Rep
Scientific Reports, Vol 12, Iss 1, Pp 1-13 (2022)Predmety: Science, Cryptographic nonce, Encryption, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, Article, Lightweight Ciphers, Cryptanalysis of Block Ciphers and Hash Functions, NIST, Artificial Intelligence, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Block cipher mode of operation, Cipher, Key (lock), Block cipher, Cryptography and Error-Correcting Codes, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Natural language processing, Cube (algebra), Public-key cryptography, Plaintext, Computer science, Combinatorics, Computer Science, Physical Sciences, Cryptography, Medicine, Computer Vision and Pattern Recognition, Mathematics
-
18
Autori: a ďalší
Prispievatelia: a ďalší
Zdroj: idUS: Depósito de Investigación de la Universidad de Sevilla
Universidad de Sevilla (US)
idUS. Depósito de Investigación de la Universidad de Sevilla
instnamePredmety: Image pattern, Symmetric-key algorithm, Partial Latin square, Isomorphism, 0102 computer and information sciences, 0101 mathematics, 01 natural sciences, Affine algebraic set
Popis súboru: application/pdf
-
19
Autori: a ďalší
Zdroj: Revista Vínculos; Vol. 18 No. 2 (2021) ; Revista Vínculos; Vol. 18 Núm. 2 (2021) ; Revista Vínculos; v. 18 n. 2 (2021) ; 2322-939X ; 1794-211X
Predmety: AES, Algoritmo de clave simétrica, Algoritmo de criptográfico, Blowfish, Symmetric-key algorithm, Cryptographic algorithm
Popis súboru: application/pdf
Relation: https://revistas.udistrital.edu.co/index.php/vinculos/article/view/17632/18723; A. Gómez Vieites, " Funcionamiento de un sistema criptográfico", Madrid: RA-MA, pp. 16, 2014. [En línea]. Disponible: https://books.google.com.co/books?id=Fo-fDwAAQBAJ&pg=PA24&dq=que+es+un+Algoritmo+de+cifrado&hl=es&sa=X&ved=2ahUKEwidid_VpfnuAhUyq1kKHWaKBAYQ6AEwBHoECAkQAg#v=onepage&q&f=true [2]. B. Donohue, "¿Qué es un Hash y como funciona?", 2018. [En línea]. Disponible: https://latam.kaspersky.com/blog/que-es-un-hash-y-como-funciona/2806/ [3] Schneier on Security, "The Blowfish Encryption Algorithm", 2019, [En línea]. Disponible: https://www.schneier.com/academic/blowfish/ [4] MDN Web, "Algoritmo criptográfico", 2020. [En línea]. Disponible: https://www.schneier.com/academic/blowfish/ [5] V. Delgado, R. Palacios, "Introducción a la criptografía: tipos de algoritmos", Anales de mecánica y electricidad, Vol. 83, no. 1, pp 43, 2006. [6]. O. Landeta, "Algoritmos de cifrado AES y DES", 2019. [En línea]. Disponible: https://www.youtube.com/watch?v=BctlBJ2NdHk [7]. N. Cumbicos, "Funcionamiento del Algoritmo AES", 2020. [En línea]. Disponible: https://www.youtube.com/watch?v=xOlEWLH_jkY [8]. A. Pousa, "Algoritmo de cifrado simétrico AES aceleración de tiempo de cómputo sobre arquitecturas multicore", 2021. [En línea]. Disponible: http://sedici.unlp.edu.ar/bitstream/handle/10915/4210/Documento_completo.pdf?sequence=1&isAllowed=y [9]. Seguridades, "Advanced Encryption Standard (AES)", 2021. [En línea]. Disponible: http://seguridaredes.blogspot.com/2013/04/normal-0-21-false-false-false-es-x-none.html [10]. B. Gatliff, "Encrypting data with the Blowfish algorithm", 2020. [En línea]. Disponible: https://www.embedded.com/encrypting-data-with-the-blowfish-algorithm/; https://revistas.udistrital.edu.co/index.php/vinculos/article/view/17632
-
20
Autori:
Predmety: Analysis of Algorithms and Complexity, Symmetric key Algorithm, Asymmetric Key algorithms, RSA, DES, Encryption, Decryption
Dostupnosť: https://doi.org/10.6084/m9.figshare.14252546.v1
Full Text Finder
Nájsť tento článok vo Web of Science