Search Results - "Symmetric encryption algorithm"
-
1
Symmetric Encryption Algorithm for RFID Systems Using a Dynamic Generation of Key
ISSN: 1694-0814, 1694-0784Published: Mahebourg International Journal of Computer Science Issues (IJCSI) 31.01.2018Published in International journal of computer science issues (31.01.2018)“…The security of RFID systems come to be a major subject today, notably for low cost RFID tags…”
Get full text
Journal Article -
2
Study of high-speed realization technics for elements of symmetric encryption algorithms during calculations on graphics processor
ISSN: 2226-1494, 2500-0373Published: ITMO University 01.07.2018Published in Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki (01.07.2018)“…Subject of Research. The paper deals with the research of transformations used in up-to-date symmetric algorithms aimed at definition of the most high-speed ways of their realization on the graphics processor…”
Get full text
Journal Article -
3
Certificateless broadcast signcryption scheme supporting equality test in smart grid
ISSN: 1932-6203, 1932-6203Published: San Francisco Public Library of Science 07.09.2023Published in PloS one (07.09.2023)“… The scheme employs a symmetric encryption algorithm to improve encryption and transmission efficiency…”
Get full text
Journal Article -
4
STUDY OF HIGH-SPEED REALIZATION TECHNICS FOR ELEMENTS OF SYMMETRIC ENCRYPTION ALGORITHMS DURING CALCULATIONS ON GRAPHICS PROCESSOR
ISSN: 2226-1494, 2500-0373Published: Saint Petersburg St. Petersburg National Research University of Information Technologies, Mechanics and Optics 01.07.2018Published in Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki (01.07.2018)“…Subject of Research. The paper deals with the research of transformations used in up-to-date symmetric algorithms aimed at definition of the most high-speed ways of their realization on the graphics processor…”
Get full text
Journal Article -
5
Evaluation of symmetric encryption algorithms for MANETs
ISBN: 1424459656, 9781424459650Published: IEEE 01.12.2010Published in 2010 IEEE International Conference on Computational Intelligence and Computing Research (01.12.2010)“… A wireless device, usually with very limited resources, especially battery power, is subject to the problem of energy consumption due to encryption algorithms…”
Get full text
Conference Proceeding -
6
A secure handshaking aodv routing protocol (SHS-AODV)
ISBN: 1538630389, 9781538630389Published: IEEE 01.03.2018Published in 2018 4th International Conference on Recent Advances in Information Technology (RAIT) (01.03.2018)“… The security of such framework is a fundamental subject. This study, we have presented the most known protocols, routing limit in MANETs for securing…”
Get full text
Conference Proceeding -
7
How to teach undergraduate students a real cipher design
ISBN: 9781424448104, 1424448107Published: IEEE 01.04.2010Published in 2010 9th International Conference on Information Technology Based Higher Education and Training (01.04.2010)“…In this study, we present a four round symmetric encryption algorithm which we call MSAES…”
Get full text
Conference Proceeding -
8
Randomization of message contents with and without encryption for covert communication scenarios: Randomization of Message Contents With and Without Encryption for Covert Communication Scenarios
ISSN: 1615-5262, 1615-5270Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2026Published in International journal of information security (01.02.2026)“…Steganographic methods often presuppose that the concealed message appears random upon encoding. When confidentiality is a concern, encryption results in a…”
Get full text
Journal Article -
9
Leveraging Intel SGX to Create a Nondisclosure Cryptographic library
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 02.04.2018Published in arXiv.org (02.04.2018)“… Since cryptology is not a widely understood subject, people on the cutting edge of research and industry are always seeking for new technologies to naturally expand the security of their programs and systems…”
Get full text
Paper

