intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Encryption methods

Xem 1-20 trên 35 kết quả Encryption methods
  • Random numbers are a crucial component of any encryption activity in modern cryptography. Quantum Random Number Generators (QRNGs) produce truly random output strings to replace pseudo-random ones. In this research, the author’s team centered on investigating and scrutinizing the design of a QRNG utilizing optical methods tailored to meet cryptographic standards.

    pdf15p vithomson 02-07-2024 0 0   Download

  • The paper proposes a method for constructing block cipher schemes that enable verifying the source and integrity of the encrypted message. Additionally, the shared secret key between the sender/encryptor and the receiver/decryptor for each encrypted message is established based on the mechanism of public key cryptography.

    pdf12p visergeyne 18-06-2024 1 0   Download

  • Ebook Decrypted secrets: Methods and maxims of cryptology presents the following content: Chapter 1 introductory synopsis; chapter 2 aims and methods of cryptography; chapter 3 encryption steps: simple substitution; chapter 4 encryption steps: polygraphic substitution and coding; chapter 5 encryption steps: linear substitution; chapter 6 encryption steps: transposition; chapter 7 polyalphabetic encryption: families of alphabets; chapter 8 polyalphabetic encryption: keys; chapter 9 composition of classes of methods; chapter 10 open encryption key systems; chapter 11 encryption security; chap...

    pdf555p zizaybay1103 29-05-2024 2 2   Download

  • When devices connecting to the Internet, one of the most problem occurred is security. There are many researchers focusing on this problem so far. Diffie-Hellman type key exchange protocols have a certain role in information security applications. This article proposes to perform encryption using pseudo-random strings to prevent unwanted attacks.

    pdf7p vijaychest 16-05-2024 3 1   Download

  • The emergence of quantum computing presents a profound challenge and opportunity for information technology (IT) audit methodologies and IT security. Quantum computing's potential to break classical encryption methods and its promise of exponential computational power necessitate a proactive response.

    pdf8p visergey 02-04-2024 6 0   Download

  • In this article, the author discusses the introduction of encryption using knowledge from the Linear Algebra course to first-year students so that they can perceive the application of Linear Algebra.

    pdf7p viberkshire 09-08-2023 3 2   Download

  • The paper proposes a deniable encryption probability pseudo-block ciphers method based on the improvement of the deniable encryption block ciphers method proposed in [11] [13], and presents the proof of the correctness, security and deniability of the proposed method.

    pdf7p viannee 02-08-2023 6 5   Download

  • Lecture Network + Guide to Networks (6th Edition) - Chapter 11: Network Security, objectives of this chapter: Identify security threats and vulnerabilities in LANs and WANs and design security policies that minimize risks; Explain security measures for network hardware and design, including firewalls, intrusion detection systems, and scanning tools; Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit.

    pdf89p chankora08 04-07-2023 9 4   Download

  • The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message.

    pdf8p visirius 19-01-2023 7 2   Download

  • With the rise of the Internet of Things (IoT), the risk of information security is increasing. There have been many proposals for IoT security, however, so far, there is not truly effective and comprehensive solution. The study aims at lightweight encryption, with the basic goal of reducing the loops of encryption algorithms, reducing the computing requirements, and energy consumption of the system while ensuring safety, and integrating into new Protocols of IoT networks and weak resource devices.

    pdf8p vimelindagates 18-07-2022 50 5   Download

  • Lecture Distributed Systems - Lecture 13: Authentication in Distributed Systems. In this chapter, students will be able to understand: System model, role of cryptography, a simple model of cryptographic system intruder, a classification of cryptographic system, conventional cryptography, modern cryptography, private key cryptography, data encryption standard (DES), public key cryptography, the rivest-shamir-adleman method,…

    pdf30p runordie1 10-05-2022 11 4   Download

  • Test is always considered a fair method to evaluate learner’s ability, however, some academic dishonesty issues discovered these recent years have proved that there are still weaknesses in organizing tests. Therefore, this paper will demonstrate the development of an online examination system using embedded system, data encryption and website development technology that expects to solve the current drawbacks in conventional examination.

    pdf10p huyetthienthan 23-11-2021 8 1   Download

  • The purpose of the dissertation is to research on the development of new and quality solutions using graph theory and automata, suggesting their applications in, and applying them to steganography and searchable encryption.

    pdf98p capheviahe26 02-02-2021 18 2   Download

  • The paper considers the possibility of using the method of testing the properties of bit sequences as one of the possible approaches to solving the problem of classifying pseudo-random sequences and the sequences formed by encryption and compression algorithms.

    pdf6p vivirginia2711 09-12-2020 15 5   Download

  • This trend has attracted increasing concerns from both academia and industry. This paper addresses how physical layer security can protect secret data compare with the traditional cryptographic encryption and which is the better cooperative relaying scheme with the state of the art approached methods in wireless relaying beamforming network.

    pdf9p vivirginia2711 09-12-2020 14 2   Download

  • In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses the security of the method encrypting directly QAM symbols instead of input bit-stream.

    pdf8p tamynhan6 14-09-2020 33 3   Download

  • This paper proposes a block crypto system that uses cyclic geometric progressions over polynomial rings as encryption function, and its encryption diagram is based on unbalanced Feistel network with four branches. All the sub keys in encryption steps are also elements in cyclic geometric progressions over polynomial ring with two cyclotomic cosets. By using this crypto system, we apply to a hash function with 512 bits output length. Some diffusion simulations of the proposed crypto system and hash function are also presented.

    pdf8p minhxaminhyeu4 15-07-2019 21 0   Download

  • In this paper we propose a new method to manage secure group using binomial key tree approach. We show that number of encryptions performed and rekey messages constructed during membership change are less compared to the scheme proposed by Wong and others. In our scheme, it is not required to balance the tree after membership change.

    pdf10p hongnhan878 12-04-2019 18 2   Download

  • There are various encryption methods to secure image from unauthorized parties. This paper is an implementation of a color image encryption algorithm based on a novel three dimensional chaotic system using a random permutation technique.

    pdf8p blossom162 31-03-2019 13 1   Download

  • The proposed solutions focus on applying encryption methods to the transmitted keys and enabling two-way communication on UAP. From performance evaluation, we show that our proposed methods are able to address the security concerns of ASK-WAP and UAP, while at the same time achieving acceptable communication overheads.

    pdf7p byphasse043256 23-03-2019 10 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1446 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2