Works matching DE "SYMMETRIC-key algorithms"
Results: 123
XEGGORA: Exploiting Immune-to-Evidence Symmetries with Full Aggregation in Statistical Relational Models.
- Published in:
- Journal of Artificial Intelligence Research, 2019, v. 66, p. 33, doi. 10.1613/jair.1.11322
- By:
- Publication type:
- Article
Performance and security analysis using B-128 modified blowfish algorithm.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 17, p. 26661, doi. 10.1007/s11042-023-15038-0
- By:
- Publication type:
- Article
Principle Component Analysis Based on New Symmetric Similarity Measures for Heavy-Tailed Data.
- Published in:
- Fluctuation & Noise Letters, 2018, v. 17, n. 4, p. N.PAG, doi. 10.1142/S0219477518500293
- By:
- Publication type:
- Article
Proposed Algorithm to generate encryption Key for Block and Stream Cipher Using DNA Computing.
- Published in:
- Iraqi Journal of Information Technology, 2018, v. 8, n. 3, Part 1, p. 68
- By:
- Publication type:
- Article
Random Number Generator based on Hybrid Algorithm between Particle Swarm Optimization (PSO) Algorithm and 3D-Chaotic System and its Application.
- Published in:
- Iraqi Journal of Information Technology, 2018, v. 8, n. 3, Part 1, p. 1
- By:
- Publication type:
- Article
The Many Ways of BYOK.
- Published in:
- ISSA Journal, 2021, v. 19, n. 2, p. 37
- By:
- Publication type:
- Article
Retro Mining and the Race for QKD.
- Published in:
- ISSA Journal, 2019, v. 17, n. 7, p. 7
- By:
- Publication type:
- Article
Encryption vs. Tokenization.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 10
- By:
- Publication type:
- Article
Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH †.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 9, p. 1337, doi. 10.3390/math12091337
- By:
- Publication type:
- Article
Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 22, p. 4575, doi. 10.3390/math11224575
- By:
- Publication type:
- Article
Mixed type symmetric duality for multiobjective variational problems with cone constraints.
- Published in:
- International Transactions in Operational Research, 2014, v. 21, n. 2, p. 291, doi. 10.1111/itor.12038
- By:
- Publication type:
- Article
Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare.
- Published in:
- Future Internet, 2023, v. 15, n. 12, p. 386, doi. 10.3390/fi15120386
- By:
- Publication type:
- Article
Securing Fingerprint Template Using Blockchain and Distributed Storage System.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 6, p. 951, doi. 10.3390/sym12060951
- By:
- Publication type:
- Article
Symmetric Key Encryption Based on Rotation-Translation Equation.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 1, p. 73, doi. 10.3390/sym12010073
- By:
- Publication type:
- Article
Measuring Performances of a White-Box Approach in the IoT Context.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 8, p. 1000, doi. 10.3390/sym11081000
- By:
- Publication type:
- Article
Cooperative Secret Sharing Using QR Codes and Symmetric Keys.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 4, p. 95, doi. 10.3390/sym10040095
- By:
- Publication type:
- Article
Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 3, p. 1176, doi. 10.3390/sym7031176
- By:
- Publication type:
- Article
Confluent Supersymmetric Partners of Quantum Systems Emerging from the Spheroidal Equation.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 412, doi. 10.3390/sym7020412
- By:
- Publication type:
- Article
The analysis and implementation of the symmetric key cryptographic algorithm based on the algebraic Paley graphs.
- Published in:
- International Journal of Mathematics & Computer Science, 2022, v. 17, n. 4, p. 1563
- By:
- Publication type:
- Article
A Hybrid Multi-Cloud Framework Using the IBBE Key Management System for Securing Data Storage.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 20, p. N.PAG, doi. 10.3390/su142013561
- By:
- Publication type:
- Article
Probabilistic Key Chain Based Key Distribution Schemes for WSN.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 5, p. 1156
- By:
- Publication type:
- Article
Proposition of a Better Data Security Model for a Protective Information Exchange on the Internet with Advanced Steganographic and Cryptographic Algorithm.
- Published in:
- Journal of Applied Sciences & Environmental Management, 2024, v. 28, n. 10, p. 3013, doi. 10.4314/jasem.v28i10.8
- By:
- Publication type:
- Article
Password Capabilities Revisited.
- Published in:
- Computer Journal, 2015, v. 58, n. 4, p. 782, doi. 10.1093/comjnl/bxt131
- By:
- Publication type:
- Article
SI 27: Recent trends in mobile and wireless applications.
- Published in:
- Wireless Networks (10220038), 2022, v. 28, n. 5, p. 2273, doi. 10.1007/s11276-022-02977-z
- By:
- Publication type:
- Article
Intelligent acquisition method for power consumption data of single channel grouping based on symmetric mathematics.
- Published in:
- Wireless Networks (10220038), 2022, v. 28, n. 5, p. 2275, doi. 10.1007/s11276-021-02704-0
- By:
- Publication type:
- Article
Response and predictor folding to counter symmetric dependency in dimension reduction.
- Published in:
- Australian & New Zealand Journal of Statistics, 2016, v. 58, n. 4, p. 515, doi. 10.1111/anzs.12170
- By:
- Publication type:
- Article
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 83, doi. 10.22042/ISECURE.2022.321346.739
- By:
- Publication type:
- Article
Frontmatter.
- Published in:
- Journal of Mathematical Cryptology, 2018, v. 12, n. 4, p. i, doi. 10.1515/jmc-2018-frontmatter4
- Publication type:
- Article
On the optimality of non-linear computations for symmetric key primitives.
- Published in:
- Journal of Mathematical Cryptology, 2018, v. 12, n. 4, p. 241, doi. 10.1515/jmc-2017-0011
- By:
- Publication type:
- Article
Rigorous upper bounds on data complexities of block cipher cryptanalysis.
- Published in:
- Journal of Mathematical Cryptology, 2017, v. 11, n. 3, p. 147, doi. 10.1515/jmc-2016-0026
- By:
- Publication type:
- Article
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme.
- Published in:
- Journal of Mathematical Cryptology, 2015, v. 9, n. 2, p. 75, doi. 10.1515/jmc-2014-0013
- By:
- Publication type:
- Article
An efficient construction of key-dependent substitution box based on chaotic sine map.
- Published in:
- International Journal of Distributed Sensor Networks, 2019, v. 15, n. 12, p. N.PAG, doi. 10.1177/1550147719895957
- By:
- Publication type:
- Article
Leakage-Resilient Cryptography from Minimal Assumptions.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 3, p. 514, doi. 10.1007/s00145-015-9200-x
- By:
- Publication type:
- Article
FaceEncAuth:Face Recognition Privacy Security Scheme Based on FaceNet and SMAlgorithms.
- Published in:
- Journal of Computer Engineering & Applications, 2022, v. 58, n. 11, p. 93, doi. 10.3778/j.issn.1002-8331.2112-0517
- By:
- Publication type:
- Article
Preserving Confidential Data Using Improved Rivest-Shamir Adleman to Secure Multi-Cloud.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 4, p. 162, doi. 10.22266/ijies2024.0831.13
- By:
- Publication type:
- Article
Privacy Enforcement on Subscribers Data in Cloud Computing.
- Published in:
- Nigerian Journal of Technology, 2021, v. 40, n. 2, p. 308, doi. 10.4314/njt.v40i2.17
- By:
- Publication type:
- Article
THEORETICAL APPROACH OF CRYPTOGRAPHIC PROTOCOLS.
- Published in:
- Review of the Air Force Academy, 2012, v. 20, n. 1, p. 19
- By:
- Publication type:
- Article
Two-Fold Encryption and Decryption using Fingerprint.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2022, v. 8, p. 52
- By:
- Publication type:
- Article
Reversible Logic based Modified Design of AES-CBC Mode.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 2, p. 48
- By:
- Publication type:
- Article
Performance Analysis of AES-128 Bits, 192 Bits and 256 Bits using Reversible Logic.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 2, p. 42
- By:
- Publication type:
- Article
SudoKrypt: A Novel Sudoku based Symmetric Encryption Scheme.
- Published in:
- Journal of Network & Information Security, 2016, v. 4, n. 2, p. 25
- By:
- Publication type:
- Article
AUDIO CRYPTANALYSIS - AN APPLICATION OF SYMMETRIC KEY CRYPTOGRAPHY AND AUDIO STEGANOGRAPHY.
- Published in:
- ICTACT Journal on Communication Technology, 2016, v. 7, n. 3, p. 1345
- By:
- Publication type:
- Article
PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM.
- Published in:
- ICTACT Journal on Communication Technology, 2014, v. 5, n. 1, p. 904, doi. 10.21917/ijct.2014.0129
- By:
- Publication type:
- Article
Pseudo-random bit generator using chaotic seed for cryptographic algorithm in data protection of electric power consumption.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2019, v. 9, n. 2, p. 1399, doi. 10.11591/ijece.v9i2.pp1399-1409
- By:
- Publication type:
- Article
User Selective Encryption Method for Securing MANETs.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 5, p. 3103, doi. 10.11591/ijece.v8i5.pp3103-3111
- By:
- Publication type:
- Article
Symmetric Key based Encryption and Decryption using Lissajous Curve Equations.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2017, v. 7, n. 1, p. 285, doi. 10.11591/ijece.v7i1.pp285-288
- By:
- Publication type:
- Article
MTL-based implementation of current-mode CMOS RMS-to-DC converters.
- Published in:
- International Journal of Circuit Theory & Applications, 2015, v. 43, n. 6, p. 793, doi. 10.1002/cta.1975
- By:
- Publication type:
- Article
A k-level data structure for large-scale traveling salesman problems.
- Published in:
- Annals of Operations Research, 2016, v. 244, n. 2, p. 583, doi. 10.1007/s10479-016-2159-7
- By:
- Publication type:
- Article
Client-Aware Negotiation for Secure and Efficient Data Transmission.
- Published in:
- Energies (19961073), 2020, v. 13, n. 21, p. 5777, doi. 10.3390/en13215777
- By:
- Publication type:
- Article
Some new results of symmetric derivative on time scales.
- Published in:
- International Journal of Open Problems in Computer Science & Mathematics, 2016, v. 9, n. 2, p. 13, doi. 10.12816/0033918
- By:
- Publication type:
- Article