Search
Search Results
-
Lightweight symmetric key encryption for text using XOR operation and permutation matrix
Traditionally, symmetric key encryption has been computationally intensive, and the balance between security and computation costs has necessitated...
-
Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication
Over the last decade, millions of 4G and 5G-enabled mobile devices have become part of the Internet. Almost, all the applications have been shifted...
-
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
Fog and dew computing represent relatively new computing paradigms in the literature. The main idea is to offload the computation processes from the...
-
Basic Cryptography: Symmetric Key Encryption
Symmetric Key (or “secret key”) cryptography is one of the two main branches of cryptography (the other being Asymmetric Key (or “public/private... -
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato
Symmetric primitives are a cornerstone of cryptography, and have traditionally been defined over fields, where cryptanalysis is now well understood.... -
Design and analysis of key scheduling algorithm for symmetric cipher security
The success and safety of block cipher systems heavily depend on how efficient and secure their Key Schedule Algorithms (KSAs) are, especially when...
-
Public key versus symmetric key cryptography in client–server authentication protocols
Every month, several new protocols are pop** up, comparing themselves with a few others and claiming to outperform the whole state of the art. The...
-
An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation
Currently, digital data security has appeared as the largest challenge before the society. This concern has become more serious due to the data... -
A symmetric neural cryptographic key generation scheme for Iot security
The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to...
-
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives
Ring signatures and ID-based cryptography are considered promising in terms of application. A ring signature authenticates messages while the author... -
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives
Consider the scenario that the prover and the verifier perform the zero-knowledge (ZK) proof protocol for the same statement multiple times... -
Revisiting Security of Symmetric-Key Encryption with Imperfect Randomness and Correlation Between Source and Keys
In the ideal environment, a secret key for a cryptosystem is generated with perfect randomness and is independent of other keys or sources. It is... -
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment
The traditional power grid systems are being replaced with smart grids so as to offer the required levels of flexibility, reliability, efficiency and... -
SQCA: symmetric key-based crypto-codec for secure nano-communication using QCA
Security in quantum dot cellular automata (SQCA) is an emerging trend in the arena of nanotechnology. Its features are high computing speed, smaller...
-
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple... -
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
Authenticated Key Exchange (AKE) is an important primitive in applied cryptography. Previously several strong models of AKE were introduced, e.g.,... -
On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives
Zero-knowledge proofs allow a prover to convince a verifier of a statement without revealing anything besides its validity. A major bottleneck in... -
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones
Unmanned aerial vehicles have been deployed for surveillance in highly sensitive domains such as in the military. As such, the data exchanged between... -
Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model
Non-malleable codes (NMC) are introduced as a relaxation of error correcting codes to protect message against tampering attacks. It is guaranteed... -
Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Key exchange protocols in the asymmetric-key setting are known to provide stronger security properties than protocols in symmetric-key cryptography....