Search
Search Results
-
Basic Cryptography: Symmetric Key Encryption
Symmetric Key (or “secret key”) cryptography is one of the two main branches of cryptography (the other being Asymmetric Key (or “public/private... -
Public key versus symmetric key cryptography in client–server authentication protocols
Every month, several new protocols are pop** up, comparing themselves with a few others and claiming to outperform the whole state of the art. The...
-
Lightweight symmetric key encryption for text using XOR operation and permutation matrix
Traditionally, symmetric key encryption has been computationally intensive, and the balance between security and computation costs has necessitated...
-
Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication
Over the last decade, millions of 4G and 5G-enabled mobile devices have become part of the Internet. Almost, all the applications have been shifted...
-
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
Fog and dew computing represent relatively new computing paradigms in the literature. The main idea is to offload the computation processes from the...
-
Cryptography
This chapter will cover cryptography and its two main types, symmetric cryptography and public key cryptography. After exploring some fundamental... -
Cryptography
Cyber cryptography is an essential field within digital security, focusing on encrypting and decrypting information. It operates at the intersection... -
Cryptography
This chapter describes the basic techniques of cryptography as a tool to ensure confidentiality of data. -
Elliptic-Curve Cryptography
Elliptic-curve cryptography (ECC) represents a public-key cryptography approach based on the algebraic structure of elliptic curves over finite... -
Cryptography
Bitcoin gave rise to the specific type of virtual currency known as cryptocurrency. The reason for this name is the extended use of cryptography. A... -
Cryptography
This chapter discusses cryptography, which is an important application of number theory. The code-breaking work done at Bletchley Park in England... -
Cryptography
As society speeds, and in most cases is literally dragged, into the new information society, the kind of face-to-face and paper-traceable... -
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato
Symmetric primitives are a cornerstone of cryptography, and have traditionally been defined over fields, where cryptanalysis is now well understood.... -
Secure gene profile data processing using lightweight cryptography and blockchain
Human microarray gene profile analysis has become popular for early cancer detection. Due to security risks, Healthcare 4.0 standards make processing...
-
Symmetric Cryptography
Symmetric encryption is the most common method to guarantee the confidentiality of a message or information. Encryption is a cryptographic process... -
Selected Areas in Cryptography – SAC 2023 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers
This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC 2023, held in Fredericton,... -
Post-Quantum Cryptography
The term post-quantum cryptography (PQC) was coined to describe alternative cryptosystems that are assumed to resist attacks using large-scale... -
Implementing Post-quantum Cryptography for Developers
Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose...
-
Applied Cryptography
This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:... -
Introduction to Public-Key Cryptography
As we start to learn about public-key cryptography, let’s recall that the term publickey cryptography is used interchangeably with asymmetric...