We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Basic Cryptography: Symmetric Key Encryption

    Symmetric Key (or “secret key”) cryptography is one of the two main branches of cryptography (the other being Asymmetric Key (or “public/private...
    Chapter 2022
  2. Public key versus symmetric key cryptography in client–server authentication protocols

    Every month, several new protocols are pop** up, comparing themselves with a few others and claiming to outperform the whole state of the art. The...

    Article 08 March 2021
  3. Lightweight symmetric key encryption for text using XOR operation and permutation matrix

    Traditionally, symmetric key encryption has been computationally intensive, and the balance between security and computation costs has necessitated...

    Maroti Deshmukh, Arjun Singh Rawat in International Journal of Information Technology
    Article 14 August 2023
  4. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication

    Over the last decade, millions of 4G and 5G-enabled mobile devices have become part of the Internet. Almost, all the applications have been shifted...

    Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf in The Journal of Supercomputing
    Article 25 April 2023
  5. Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing

    Fog and dew computing represent relatively new computing paradigms in the literature. The main idea is to offload the computation processes from the...

    Awaneesh Kumar Yadav, An Braeken, Manoj Misra in The Journal of Supercomputing
    Article 24 February 2023
  6. Cryptography

    This chapter will cover cryptography and its two main types, symmetric cryptography and public key cryptography. After exploring some fundamental...
    Imran Bashir in Blockchain Consensus
    Chapter 2022
  7. Cryptography

    Cyber cryptography is an essential field within digital security, focusing on encrypting and decrypting information. It operates at the intersection...
    Dr. Jason Edwards in Mastering Cybersecurity
    Chapter 2024
  8. Cryptography

    This chapter describes the basic techniques of cryptography as a tool to ensure confidentiality of data.
    Chapter 2024
  9. Elliptic-Curve Cryptography

    Elliptic-curve cryptography (ECC) represents a public-key cryptography approach based on the algebraic structure of elliptic curves over finite...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Pro Cryptography and Cryptanalysis with C++23
    Chapter 2023
  10. Cryptography

    Bitcoin gave rise to the specific type of virtual currency known as cryptocurrency. The reason for this name is the extended use of cryptography. A...
    Anders Lisdorf in Still Searching for Satoshi
    Chapter 2023
  11. Cryptography

    This chapter discusses cryptography, which is an important application of number theory. The code-breaking work done at Bletchley Park in England...
    Chapter 2023
  12. Cryptography

    As society speeds, and in most cases is literally dragged, into the new information society, the kind of face-to-face and paper-traceable...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  13. Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato

    Symmetric primitives are a cornerstone of cryptography, and have traditionally been defined over fields, where cryptanalysis is now well understood....
    Lorenzo Grassi, Irati Manterola Ayala, ... Qingju Wang in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  14. Secure gene profile data processing using lightweight cryptography and blockchain

    Human microarray gene profile analysis has become popular for early cancer detection. Due to security risks, Healthcare 4.0 standards make processing...

    Hemant Mahajan, K. T. V. Reddy in Cluster Computing
    Article 12 August 2023
  15. Symmetric Cryptography

    Symmetric encryption is the most common method to guarantee the confidentiality of a message or information. Encryption is a cryptographic process...
    François Weissbaum, Thomas Lugrin in Trends in Data Protection and Encryption Technologies
    Chapter Open access 2023
  16. Selected Areas in Cryptography – SAC 2023 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers

    This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC 2023, held in Fredericton,...
    Claude Carlet, Kalikinkar Mandal, Vincent Rijmen in Lecture Notes in Computer Science
    Conference proceedings 2024
  17. Post-Quantum Cryptography

    The term post-quantum cryptography (PQC) was coined to describe alternative cryptosystems that are assumed to resist attacks using large-scale...
    Christof Paar, Jan Pelzl, Tim Güneysu in Understanding Cryptography
    Chapter 2024
  18. Implementing Post-quantum Cryptography for Developers

    Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose...

    Julius Hekkala, Mari Muurman, ... Visa Vallivaara in SN Computer Science
    Article Open access 29 April 2023
  19. Applied Cryptography

    This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:...
    Chapter 2024
  20. Introduction to Public-Key Cryptography

    As we start to learn about public-key cryptography, let’s recall that the term publickey cryptography is used interchangeably with asymmetric...
    Christof Paar, Jan Pelzl, Tim Güneysu in Understanding Cryptography
    Chapter 2024
Did you find what you were looking for? Share feedback.