Showing 1 - 20 results of 23 for search '"Symmetric-key algorithm"', query time: 1.56s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
    by Aji Purwinarko, Wahyu Hardyanto
    Published 2018-05-01
    ...) and Blowfish. AES and Blowfish is a symmetric key algorithm is very fast and powerful. With the utilization...
    Get full text
    Article
  5. 5
    by David Fabián Cevallos Salas
    Published 2019-05-01
    ... One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones...
    Get full text
    Article
  6. 6
    by Tran Khanh Dang, Khanh T. K. Tran
    Published 2019-01-01
    .... The threshold of maximum friends can modify based on the optimization of the symmetric-key algorithm to diminish...
    Get full text
    Article
  7. 7
    by Ghaznavi, Solmaz
    Published 2011
    ...This thesis presents a new architecture for the reliable implementation of the symmetric-key...
    Get full text
  8. 8
    by Ghaznavi, Solmaz
    Published 2011
    ...This thesis presents a new architecture for the reliable implementation of the symmetric-key...
    Get full text
  9. 9
    by Youngbeom Kim, Seog Chung Seo
    Published 2021-01-01
    ...), one of the upper algorithms of a symmetric-key algorithm, to prove the generality of our optimization...
    Get full text
    Article
  10. 10
    ... and symmetric encryption. The fingerprint is encrypted by the symmetric key algorithm: Advanced Encryption...
    Get full text
    Article
  11. 11
    ... in unprotected environments, where adversaries are able to play with the symmetric-key algorithm used...
    Get full text
    Article
  12. 12
    by Baril-Robichaud, Patrick
    Published 2017
    ... simple des S-Boxes. === We developed a new symmetric-key algorithm that is highly secure. Our algorithm...
    Get full text
  13. 13
    by Dušan Božilov, Begül Bilgin, Hacı Ali Sahin
    Published 2017-03-01
    ... various cryptographic and implementation properties of symmetric-key algorithms. We show that there exist...
    Get full text
    Article
  14. 14
    ... in the constrained devices used by these networks. Symmetric key algorithms are a typically efficient and fast...
    Get full text
    Article
  15. 15
    by Borislav Stoyanov, Gyurhan Nedzhibov
    Published 2020-01-01
    ... of symmetric key instead of public key. Symmetric key algorithms use the same key for both encryption...
    Get full text
    Article
  16. 16
    ... and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate...
    Get full text
    Article
  17. 17
    ... Synchronize Choice Petri nets.   Based on modern symmetric-key algorithms, such as DES, the dynamic key...
    Get full text
  18. 18
    ...A substitution box is a core component of the popular symmetric-key algorithms. However, the major...
    Get full text
    Article
  19. 19
    by Ying-tse Lee, 李滎澤
    Published 2003
    ... symmetric-key algorithms, such as DES, the dynamic key exchange mechanism enables two communicating sides...
    Get full text
    Others
  20. 20
    ..., while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private...
    Get full text
    Article