Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2by Kyeeun Kim, Siwoong Park, Chanil Yeo, Hyoung-Jun Park, Hyunjin Kim, Young Soon Heo, Hyun Seo Kang, Kyungsoo KimSubjects: “...symmetric-key algorithm...”
Published 2021-02-01
Get full text
Article -
3
-
4“...) and Blowfish. AES and Blowfish is a symmetric key algorithm is very fast and powerful. With the utilization...”
Get full text
Article -
5by David Fabián Cevallos Salas“... One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones...”
Published 2019-05-01
Get full text
Article -
6“.... The threshold of maximum friends can modify based on the optimization of the symmetric-key algorithm to diminish...”
Get full text
Article -
7by Ghaznavi, Solmaz“...This thesis presents a new architecture for the reliable implementation of the symmetric-key...”
Published 2011
Get full text
-
8by Ghaznavi, Solmaz“...This thesis presents a new architecture for the reliable implementation of the symmetric-key...”
Published 2011
Get full text
-
9“...), one of the upper algorithms of a symmetric-key algorithm, to prove the generality of our optimization...”
Get full text
Article -
10“... and symmetric encryption. The fingerprint is encrypted by the symmetric key algorithm: Advanced Encryption...”
Get full text
Article -
11by Daniele Giacomo Vittorio Albricci, Michela Ceria, Federico Cioschi, Nicolò Fornari, Arvin Shakiba, Andrea Visconti“... in unprotected environments, where adversaries are able to play with the symmetric-key algorithm used...”
Published 2019-08-01
Get full text
Article -
12by Baril-Robichaud, Patrick“... simple des S-Boxes. === We developed a new symmetric-key algorithm that is highly secure. Our algorithm...”
Published 2017
Get full text
-
13“... various cryptographic and implementation properties of symmetric-key algorithms. We show that there exist...”
Get full text
Article -
14“... in the constrained devices used by these networks. Symmetric key algorithms are a typically efficient and fast...”
Get full text
Article -
15“... of symmetric key instead of public key. Symmetric key algorithms use the same key for both encryption...”
Get full text
Article -
16“... and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate...”
Get full text
Article -
17by 李滎澤, Ying-tse Lee“... Synchronize Choice Petri nets. Based on modern symmetric-key algorithms, such as DES, the dynamic key...”
Get full text
-
18“...A substitution box is a core component of the popular symmetric-key algorithms. However, the major...”
Get full text
Article -
19“... symmetric-key algorithms, such as DES, the dynamic key exchange mechanism enables two communicating sides...”
Get full text
Others -
20by Chiranji Lal Chowdhary, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan P., Muhammad Fazal Ijaz“..., while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private...”
Published 2020-09-01
Get full text
Article