Search Results - "Symmetric encryption algorithm"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Symmetric Encryption Algorithm for RFID Systems Using a Dynamic Generation of Key by Labbi, Zouheir, Senhadji, Mohamed, Maarof, Ahmed, Belkasmi, Mostafa

    ISSN: 1694-0814, 1694-0784
    Published: Mahebourg International Journal of Computer Science Issues (IJCSI) 31.01.2018
    “…The security of RFID systems come to be a major subject today, notably for low cost RFID tags…”
    Get full text
    Journal Article
  2. 2

    Study of high-speed realization technics for elements of symmetric encryption algorithms during calculations on graphics processor by Udaltsov, V.A., Karmanovskiy, N.S.

    ISSN: 2226-1494, 2500-0373
    Published: ITMO University 01.07.2018
    “…Subject of Research. The paper deals with the research of transformations used in up-to-date symmetric algorithms aimed at definition of the most high-speed ways of their realization on the graphics processor…”
    Get full text
    Journal Article
  3. 3

    Certificateless broadcast signcryption scheme supporting equality test in smart grid by Niu, Shufen, Dong, Runyuan, Fang, Lizhi

    ISSN: 1932-6203, 1932-6203
    Published: San Francisco Public Library of Science 07.09.2023
    Published in PloS one (07.09.2023)
    “… The scheme employs a symmetric encryption algorithm to improve encryption and transmission efficiency…”
    Get full text
    Journal Article
  4. 4

    STUDY OF HIGH-SPEED REALIZATION TECHNICS FOR ELEMENTS OF SYMMETRIC ENCRYPTION ALGORITHMS DURING CALCULATIONS ON GRAPHICS PROCESSOR by Udaltsov, V A, Karmanovskiy, N S

    ISSN: 2226-1494, 2500-0373
    Published: Saint Petersburg St. Petersburg National Research University of Information Technologies, Mechanics and Optics 01.07.2018
    “…Subject of Research. The paper deals with the research of transformations used in up-to-date symmetric algorithms aimed at definition of the most high-speed ways of their realization on the graphics processor…”
    Get full text
    Journal Article
  5. 5

    Evaluation of symmetric encryption algorithms for MANETs by Umaparvathi, M, Varughese, D K

    ISBN: 1424459656, 9781424459650
    Published: IEEE 01.12.2010
    “… A wireless device, usually with very limited resources, especially battery power, is subject to the problem of energy consumption due to encryption algorithms…”
    Get full text
    Conference Proceeding
  6. 6

    A secure handshaking aodv routing protocol (SHS-AODV) by Kumar, Ranjit, Tripathi, Sachin, Agrawal, Rajeev

    ISBN: 1538630389, 9781538630389
    Published: IEEE 01.03.2018
    “… The security of such framework is a fundamental subject. This study, we have presented the most known protocols, routing limit in MANETs for securing…”
    Get full text
    Conference Proceeding
  7. 7

    How to teach undergraduate students a real cipher design by Sakalli, M Tolga

    ISBN: 9781424448104, 1424448107
    Published: IEEE 01.04.2010
    “…In this study, we present a four round symmetric encryption algorithm which we call MSAES…”
    Get full text
    Conference Proceeding
  8. 8

    Randomization of message contents with and without encryption for covert communication scenarios: Randomization of Message Contents With and Without Encryption for Covert Communication Scenarios by Rajba, Paweł, Keller, Jörg, Mazurczyk, Wojciech

    ISSN: 1615-5262, 1615-5270
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2026
    “…Steganographic methods often presuppose that the concealed message appears random upon encoding. When confidentiality is a concern, encryption results in a…”
    Get full text
    Journal Article
  9. 9

    Leveraging Intel SGX to Create a Nondisclosure Cryptographic library by Mohammad Hasanzadeh Mofrad, Lee, Adam

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 02.04.2018
    Published in arXiv.org (02.04.2018)
    “… Since cryptology is not a widely understood subject, people on the cutting edge of research and industry are always seeking for new technologies to naturally expand the security of their programs and systems…”
    Get full text
    Paper