Search Results - "Symmetric encryption algorithm"

Refine Results
  1. 1

    Development and analysis of symmetric encryption algorithm by Khompysh, Ardabek, Dyusenbayev, Dilmukhanbet, Maxmet, Muratkhan

    ISSN: 2088-8708, 2722-2578
    Published: 01.04.2025
    “…This paper introduces a new block encryption algorithm designed for the cryptographic protection of data. The paper introduces and explains a newly devised…”
    Get full text
    Journal Article
  2. 2

    An efficient fully homomorphic symmetric encryption algorithm by Hariss, Khalil, Noura, Hassan, Samhat, Abed Ellatif

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.05.2020
    Published in Multimedia tools and applications (01.05.2020)
    “…In this paper, we consider Homomorphic Encryption (HE) to process over encrypted data to achieve users privacy. We present a framework solution that provides a…”
    Get full text
    Journal Article
  3. 3

    A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs by Shi, Yang, Wei, Wujing, He, Zongjian

    ISSN: 1424-8220, 1424-8220
    Published: Switzerland MDPI AG 21.05.2015
    Published in Sensors (Basel, Switzerland) (21.05.2015)
    “…Wireless Sensor Networks (WSNs) are often deployed in hostile environments and, thus, nodes can be potentially captured by an adversary. This is a typical…”
    Get full text
    Journal Article
  4. 4

    Multi Source Data Association Clustering Analysis Based on Symmetric Encryption Algorithm by Wang, Haiqing

    ISSN: 1383-469X, 1572-8153
    Published: New York Springer US 01.08.2022
    Published in Mobile networks and applications (01.08.2022)
    “…Due to the low clustering accuracy of the existing methods, a multi-source data association clustering method based on symmetric encryption algorithm is proposed…”
    Get full text
    Journal Article
  5. 5

    SEARCH: Symmetric Encryption Algorithm Research and Characteristic Hunting by Banu, Teodora-Georgiana, Togan, Mihai

    ISSN: 1938-1883
    Published: IEEE 03.10.2024
    “…SEARCH is a Python library that we developed to help cryptanalysts evaluate the security of block ciphers, specifically those based on substitution-…”
    Get full text
    Conference Proceeding
  6. 6

    Application of Symmetric Encryption Algorithm Sensor in the Research of College Student Security Management System by Wu, Kexu, Li, Chaolin

    ISSN: 1687-725X, 1687-7268
    Published: New York Hindawi 07.07.2022
    Published in Journal of sensors (07.07.2022)
    “…’ information security management, this paper proposes a design of college students’ security management system based on a symmetric encryption algorithm…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification by Hao, Jiakai, Jin, Ming, Li, Yuting, Yang, Yuxin

    ISSN: 2376-5992, 2376-5992
    Published: United States PeerJ. Ltd 04.04.2025
    Published in PeerJ. Computer science (04.04.2025)
    “… security of power systems. In this study, we first introduce a plaintext guessing model (SCGM model) based on symmetric encryption algorithms, leveraging the strengths…”
    Get full text
    Journal Article
  9. 9
  10. 10

    A Secret Key Classification Framework of Symmetric Encryption Algorithm Based on Deep Transfer Learning by Cui, Xiaotong, Zhang, Hongxin, Fang, Xing, Wang, Yuanzhen, Wang, Danzhi, Fan, Fan, Shu, Lei

    ISSN: 2076-3417, 2076-3417
    Published: Basel MDPI AG 01.11.2023
    Published in Applied sciences (01.11.2023)
    “…The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key…”
    Get full text
    Journal Article
  11. 11

    Research on method of gravity thermal coupling field-flow fractionation based on symmetric encryption algorithm by Jiang, Donglin, Farhadi, Toofan, Nabipour, Narjes

    ISSN: 1388-6150, 1588-2926
    Published: Cham Springer International Publishing 01.12.2020
    “…The most frequently used method includes the gravity field-flow separation and thermal field-flow separation. By analyzing the influence of velocity of carrier…”
    Get full text
    Journal Article
  12. 12

    Symmetric Encryption Algorithm using ASCII Values by Pujeri, Dr. Uma, Pujeri, Dr. Ramachandra

    ISSN: 2277-3878, 2277-3878
    Published: 30.01.2020
    “…Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm…”
    Get full text
    Journal Article
  13. 13

    A Dynamic Light-Weight Symmetric Encryption Algorithm for Secure Data Transmission via BLE Beacons by Banani, Sam, Thiemjarus, Surapa, Wongthavarawat, Kitti, Ounanong, Nattapong

    ISSN: 2224-2708, 2224-2708
    Published: Basel MDPI AG 01.03.2022
    Published in Journal of sensor and actuator networks (01.03.2022)
    “…Pervasive sensing with Body Sensor Networks (BSNs) is a promising technology for continuous health monitoring. Since the sensor nodes are resource-limited,…”
    Get full text
    Journal Article
  14. 14
  15. 15

    Development and Analysis of Symmetric Encryption Algorithm Qamal Based on a Substitution-permutation Network by Biyashev, Rustem G., Kapalova, Nursulu A., Dyusenbayev, Dilmuhanbet S., Algazy, Kunbolat T., Wojcik, Waldemar, Smolarz, Andrzej

    ISSN: 2081-8491, 2300-1933
    Published: Warsaw Polish Academy of Sciences 01.01.2021
    “…This paper represents a developed cryptographic information protection algorithm based on a substitutionpermutation network. We describe the cryptographic…”
    Get full text
    Journal Article
  16. 16
  17. 17
  18. 18

    Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm by Gao, Lijun, Zhang, Lu, Ma, Maode

    ISSN: 0929-6212, 1572-834X
    Published: New York Springer US 01.09.2017
    Published in Wireless personal communications (01.09.2017)
    “…Research shows that heavy-weighted RFID authentication protocol is weak to adapt to low-cost RFID tags because of the usage of public key Encryption Algorithm…”
    Get full text
    Journal Article
  19. 19

    A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite by Altigani, Abdelrahman, Hasan, Shafaatunnur, Shamsuddin, Siti Mariyam, Barry, Bazara

    ISSN: 2214-2126
    Published: Elsevier Ltd 01.06.2019
    “…This research paper introduces a novel symmetric encryption algorithm that provides the confidentiality security service without leaking enough information about the exact encryption algorithm…”
    Get full text
    Journal Article
  20. 20

    A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts by Shi, Yang, Liu, Qin, Zhao, Qinpei

    ISSN: 1110-757X, 1687-0042
    Published: Cairo, Egypt Hindawi Limiteds 01.01.2013
    Published in Journal of Applied Mathematics (01.01.2013)
    “… As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is proposed…”
    Get full text
    Journal Article