Suchergebnisse - "symmetric encryption algorithm"

  • Treffer 1 - 9 von 9
Treffer weiter einschränken
  1. 1

    Symmetric Encryption Algorithm for RFID Systems Using a Dynamic Generation of Key von Labbi, Zouheir, Senhadji, Mohamed, Maarof, Ahmed, Belkasmi, Mostafa

    ISSN: 1694-0814, 1694-0784
    Veröffentlicht: Mahebourg International Journal of Computer Science Issues (IJCSI) 31.01.2018
    Veröffentlicht in International journal of computer science issues (31.01.2018)
    “… The security of RFID systems come to be a major subject today, notably for low cost RFID tags …”
    Volltext
    Journal Article
  2. 2

    STUDY OF HIGH-SPEED REALIZATION TECHNICS FOR ELEMENTS OF SYMMETRIC ENCRYPTION ALGORITHMS DURING CALCULATIONS ON GRAPHICS PROCESSOR von Udaltsov, V A, Karmanovskiy, N S

    ISSN: 2226-1494, 2500-0373
    Veröffentlicht: Saint Petersburg St. Petersburg National Research University of Information Technologies, Mechanics and Optics 01.07.2018
    “… Subject of Research. The paper deals with the research of transformations used in up-to-date symmetric algorithms aimed at definition of the most high-speed ways of their realization on the graphics processor …”
    Volltext
    Journal Article
  3. 3

    Study of high-speed realization technics for elements of symmetric encryption algorithms during calculations on graphics processor von Udaltsov, V.A., Karmanovskiy, N.S.

    ISSN: 2226-1494, 2500-0373
    Veröffentlicht: ITMO University 01.07.2018
    “… Subject of Research. The paper deals with the research of transformations used in up-to-date symmetric algorithms aimed at definition of the most high-speed ways of their realization on the graphics processor …”
    Volltext
    Journal Article
  4. 4

    Certificateless broadcast signcryption scheme supporting equality test in smart grid von Niu, Shufen, Dong, Runyuan, Fang, Lizhi

    ISSN: 1932-6203, 1932-6203
    Veröffentlicht: San Francisco Public Library of Science 07.09.2023
    Veröffentlicht in PloS one (07.09.2023)
    “… The scheme employs a symmetric encryption algorithm to improve encryption and transmission efficiency …”
    Volltext
    Journal Article
  5. 5

    Evaluation of symmetric encryption algorithms for MANETs von Umaparvathi, M, Varughese, D K

    ISBN: 1424459656, 9781424459650
    Veröffentlicht: IEEE 01.12.2010
    “… A wireless device, usually with very limited resources, especially battery power, is subject to the problem of energy consumption due to encryption algorithms …”
    Volltext
    Tagungsbericht
  6. 6

    A secure handshaking aodv routing protocol (SHS-AODV) von Kumar, Ranjit, Tripathi, Sachin, Agrawal, Rajeev

    ISBN: 1538630389, 9781538630389
    Veröffentlicht: IEEE 01.03.2018
    “… The security of such framework is a fundamental subject. This study, we have presented the most known protocols, routing limit in MANETs for securing …”
    Volltext
    Tagungsbericht
  7. 7

    How to teach undergraduate students a real cipher design von Sakalli, M Tolga

    ISBN: 9781424448104, 1424448107
    Veröffentlicht: IEEE 01.04.2010
    “… In this study, we present a four round symmetric encryption algorithm which we call MSAES …”
    Volltext
    Tagungsbericht
  8. 8

    Randomization of message contents with and without encryption for covert communication scenarios: Randomization of Message Contents With and Without Encryption for Covert Communication Scenarios von Rajba, Paweł, Keller, Jörg, Mazurczyk, Wojciech

    ISSN: 1615-5262, 1615-5270
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2026
    Veröffentlicht in International journal of information security (01.02.2026)
    “… Steganographic methods often presuppose that the concealed message appears random upon encoding. When confidentiality is a concern, encryption results in a …”
    Volltext
    Journal Article
  9. 9

    Leveraging Intel SGX to Create a Nondisclosure Cryptographic library von Mohammad Hasanzadeh Mofrad, Lee, Adam

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 02.04.2018
    Veröffentlicht in arXiv.org (02.04.2018)
    “… Since cryptology is not a widely understood subject, people on the cutting edge of research and industry are always seeking for new technologies to naturally expand the security of their programs and systems …”
    Volltext
    Paper