We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Lightweight symmetric key encryption for text using XOR operation and permutation matrix

    Traditionally, symmetric key encryption has been computationally intensive, and the balance between security and computation costs has necessitated...

    Maroti Deshmukh, Arjun Singh Rawat in International Journal of Information Technology
    Article 14 August 2023
  2. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication

    Over the last decade, millions of 4G and 5G-enabled mobile devices have become part of the Internet. Almost, all the applications have been shifted...

    Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf in The Journal of Supercomputing
    Article 25 April 2023
  3. Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing

    Fog and dew computing represent relatively new computing paradigms in the literature. The main idea is to offload the computation processes from the...

    Awaneesh Kumar Yadav, An Braeken, Manoj Misra in The Journal of Supercomputing
    Article 24 February 2023
  4. Basic Cryptography: Symmetric Key Encryption

    Symmetric Key (or “secret key”) cryptography is one of the two main branches of cryptography (the other being Asymmetric Key (or “public/private...
    Chapter 2022
  5. Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato

    Symmetric primitives are a cornerstone of cryptography, and have traditionally been defined over fields, where cryptanalysis is now well understood....
    Lorenzo Grassi, Irati Manterola Ayala, ... Qingju Wang in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  6. Design and analysis of key scheduling algorithm for symmetric cipher security

    The success and safety of block cipher systems heavily depend on how efficient and secure their Key Schedule Algorithms (KSAs) are, especially when...

    Vikas Tiwari, U. Surya Kameswari, ... Ashutosh Saxena in International Journal of Information Technology
    Article 07 June 2024
  7. Public key versus symmetric key cryptography in client–server authentication protocols

    Every month, several new protocols are pop** up, comparing themselves with a few others and claiming to outperform the whole state of the art. The...

    Article 08 March 2021
  8. An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation

    Currently, digital data security has appeared as the largest challenge before the society. This concern has become more serious due to the data...
    Karan Padhiyar, Divyang Chauhan, ... Debabrata swain in Advancements in Smart Computing and Information Security
    Conference paper 2022
  9. A symmetric neural cryptographic key generation scheme for Iot security

    The use of CMOS technology to generate neural session keys is presented in this research for incorporation with the Internet of Things (IoT) to...

    Arindam Sarkar in Applied Intelligence
    Article 08 August 2022
  10. Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives

    Ring signatures and ID-based cryptography are considered promising in terms of application. A ring signature authenticates messages while the author...
    Maxime Buser, Joseph K. Liu, ... Amin Sakzad in Applied Cryptography and Network Security
    Conference paper 2022
  11. Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives

    Consider the scenario that the prover and the verifier perform the zero-knowledge (ZK) proof protocol for the same statement multiple times...
    Handong Zhang, Puwen Wei, ... Guoxiao Liu in Information Security and Privacy
    Conference paper 2022
  12. Revisiting Security of Symmetric-Key Encryption with Imperfect Randomness and Correlation Between Source and Keys

    In the ideal environment, a secret key for a cryptosystem is generated with perfect randomness and is independent of other keys or sources. It is...
    Conference paper 2022
  13. Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment

    The traditional power grid systems are being replaced with smart grids so as to offer the required levels of flexibility, reliability, efficiency and...
    Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, ... Zaid Ameen Abduljabbar in Applied Cryptography in Computer and Communications
    Conference paper 2022
  14. SQCA: symmetric key-based crypto-codec for secure nano-communication using QCA

    Security in quantum dot cellular automata (SQCA) is an emerging trend in the arena of nanotechnology. Its features are high computing speed, smaller...

    Bikash Debnath, Jadav Chandra Das, Debashis De in Photonic Network Communications
    Article 27 October 2021
  15. Symmetric Key Exchange with Full Forward Security and Robust Synchronization

    We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple...
    Colin Boyd, Gareth T. Davies, ... Lise Millerjord in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  16. Modular Design of Role-Symmetric Authenticated Key Exchange Protocols

    Authenticated Key Exchange (AKE) is an important primitive in applied cryptography. Previously several strong models of AKE were introduced, e.g.,...
    Yuting **ao, Rui Zhang, Hui Ma in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  17. On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives

    Zero-knowledge proofs allow a prover to convince a verifier of a statement without revealing anything besides its validity. A major bottleneck in...
    Laasya Bangalore, Rishabh Bhadauria, ... Muthuramakrishnan Venkitasubramaniam in Theory of Cryptography
    Conference paper 2022
  18. MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones

    Unmanned aerial vehicles have been deployed for surveillance in highly sensitive domains such as in the military. As such, the data exchanged between...
    Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, ... Dhafer G. Honi in Future Access Enablers for Ubiquitous and Intelligent Infrastructures
    Conference paper 2022
  19. Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model

    Non-malleable codes (NMC) are introduced as a relaxation of error correcting codes to protect message against tampering attacks. It is guaranteed...
    Anit Kumar Ghosal, Satrajit Ghosh, Dipanwita Roychowdhury in Provable and Practical Security
    Conference paper 2022
  20. Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy

    Key exchange protocols in the asymmetric-key setting are known to provide stronger security properties than protocols in symmetric-key cryptography....
    Gildas Avoine, Sébastien Canard, Loïc Ferreira in Topics in Cryptology – CT-RSA 2020
    Conference paper 2020
Did you find what you were looking for? Share feedback.