Journal articles on the topic 'Cipher suites'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cipher suites.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lara, Evangelina, Leocundo Aguilar, Jesús García, and Mauricio Sanchez. "A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices." Sensors 18, no. 10 (2018): 3326. http://dx.doi.org/10.3390/s18103326.
Full textKolegov, D. N., and Y. R. Khalniyazova. "WireGuard protocol with gost cipher suites." Prikladnaya diskretnaya matematika. Prilozhenie, no. 14 (September 1, 2021): 81–84. http://dx.doi.org/10.17223/2226308x/14/18.
Full textFan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.
Full textSerrano, Ronaldo, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham, and Trong-Thuc Hoang. "ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3." Cryptography 6, no. 2 (2022): 30. http://dx.doi.org/10.3390/cryptography6020030.
Full textMashael, Alsaleh, and Aldossary Abdullah. "Cryptographic Key Generation for Logically Shared Data Stores." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 58–59. https://doi.org/10.5281/zenodo.8185969.
Full textAlamer, Ahmed, Ben Soh, and David E. Brumbaugh. "MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT." Symmetry 12, no. 1 (2019): 32. http://dx.doi.org/10.3390/sym12010032.
Full textArunkumar, B., and G. Kousalya. "Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS." Computer Systems Science and Engineering 40, no. 1 (2022): 179–90. http://dx.doi.org/10.32604/csse.2022.018166.
Full textPeñarrieta, David, Marlon Navia, Eliana Garcia, and Dannyll Zambrano. "Evaluación de la Seguridad de Certificados Digitales en las Plataformas Financieras de Ecuador." Revista Tecnológica - ESPOL 36, no. 2 (2024): 174–89. https://doi.org/10.37815/rte.v36n2.1222.
Full textFadhli, Muhamad, Fityan Ali Munshi, and Taufik Adi Wicaksono. "Ancaman Keamanan pada Transport Layer Security." Jurnal ULTIMA Computing 7, no. 2 (2016): 70–75. http://dx.doi.org/10.31937/sk.v7i2.234.
Full textAnelia, Syifa Sabrina, Jayanta Jayanta, and Bayu Hananto. "Uji Penetrasi Server Universitas PQR Menggunakan Metode National Institute Of Standards And Technology (NIST SP 800-115)." Jurnal Ilmu Teknik dan Komputer 7, no. 1 (2023): 34. http://dx.doi.org/10.22441/jitkom.2023.v7i1.005.
Full textArunkumar, B., and G. Kousalya. "Nonce reuse/misuse resistance authentication encryption schemes for modern TLS cipher suites and QUIC based web servers." Journal of Intelligent & Fuzzy Systems 38, no. 5 (2020): 6483–93. http://dx.doi.org/10.3233/jifs-179729.
Full textDuan, Li, Yong Li, and Lijun Liao. "Practical Certificate-Less Infrastructure with Application in TLS." Cryptography 7, no. 4 (2023): 63. http://dx.doi.org/10.3390/cryptography7040063.
Full textSuárez-Albela, Manuel, Paula Fraga-Lamas, Luis Castedo, and Tiago Fernández-Caramés. "Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices." Sensors 19, no. 1 (2018): 15. http://dx.doi.org/10.3390/s19010015.
Full textYerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.
Full textIbrahim, Nahla, and Johnson Agbinya. "Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices." Applied Sciences 13, no. 7 (2023): 4398. http://dx.doi.org/10.3390/app13074398.
Full textSalles, Rafael, and Ricardo Farias. "TLS Protocol Analysis Using IoTST—An IoT Benchmark Based on Scheduler Traces." Sensors 23, no. 5 (2023): 2538. http://dx.doi.org/10.3390/s23052538.
Full textSuárez-Albela, Manuel, Paula Fraga-Lamas, and Tiago Fernández-Caramés. "A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices." Sensors 18, no. 11 (2018): 3868. http://dx.doi.org/10.3390/s18113868.
Full textGentile, Antonio Francesco, Davide Macrì, Domenico Luca Carnì, Emilio Greco, and Francesco Lamonaca. "A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures." Sensors 24, no. 9 (2024): 2781. http://dx.doi.org/10.3390/s24092781.
Full textHieu, Minh Nguyen, Duy Ho Ngoc, Canh Hoang Ngoc, Trung Dinh Phuong, and Manh Tran Cong. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5470. http://dx.doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textMinh, Nguyen Hieu, Ho Ngoc Duy, Hoang Ngoc Canh, Dinh Phuong Trung, and Tran Cong Manh. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5470–78. https://doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textSarasa Laborda, Ventura, Luis Hernández-Álvarez, Luis Hernández Encinas, José Ignacio Sánchez García, and Araceli Queiruga-Dios. "Study About the Performance of Ascon in Arduino Devices." Applied Sciences 15, no. 7 (2025): 4071. https://doi.org/10.3390/app15074071.
Full textYu, Mingfei, Dewmini Sudara Marakkalage, and Giovanni De Micheli. "Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation." Cryptography 7, no. 4 (2023): 61. http://dx.doi.org/10.3390/cryptography7040061.
Full textNannipieri, Pietro, Stefano Di Matteo, Luca Baldanzi, et al. "True Random Number Generator Based on Fibonacci-Galois Ring Oscillators for FPGA." Applied Sciences 11, no. 8 (2021): 3330. http://dx.doi.org/10.3390/app11083330.
Full textGentile, Antonio Francesco, Davide Macrì, Domenico Luca Carnì, Emilio Greco, and Francesco Lamonaca. "A Network Performance Analysis of MQTT Security Protocols with Constrained Hardware in the Dark Net for DMS." Applied Sciences 14, no. 18 (2024): 8501. http://dx.doi.org/10.3390/app14188501.
Full textSudarshan, Deeksha, Chirag Khandelwal, Linge Gowda B M, Kiran Kumar Bijjaragi, and Rekha S S. "Resource Centric Analysis of RSA and ECC Algorithms on FPGA." ITM Web of Conferences 56 (2023): 01006. http://dx.doi.org/10.1051/itmconf/20235601006.
Full textA. Baker, Shatha, and Ahmed S. Nori. "Comparison of the Randomness Analysis of the Modified Rectangle Block Cipher and Original algorithm." NTU Journal of Pure Sciences 1, no. 2 (2022): 10–21. http://dx.doi.org/10.56286/ntujps.v1i2.185.
Full textNajm, Hayder, Mohammed Salih Mahdi, and Wijdan Rashid Abdulhussien. "Lightweight Image Encryption Using Chacha20 and Serpent Algorithm." Journal of Internet Services and Information Security 14, no. 4 (2024): 436–49. https://doi.org/10.58346/jisis.2024.i4.027.
Full textSawka, Maciej, and Marcin Niemiec. "A Sponge-Based Key Expansion Scheme for Modern Block Ciphers." Energies 15, no. 19 (2022): 6864. http://dx.doi.org/10.3390/en15196864.
Full textWu, Shyi-Tsong. "A Secure Real-Time IoT Data Stream Based on Improved Compound Coupled Map Lattices." Applied Sciences 12, no. 17 (2022): 8489. http://dx.doi.org/10.3390/app12178489.
Full textKumar, Manoj, Dhananjoy Dey, Saibal K. Pal, and Anupama Panigrahi. "HeW: AHash Function based on Lightweight Block Cipher FeW." Defence Science Journal 67, no. 6 (2017): 636. http://dx.doi.org/10.14429/dsj.67.10791.
Full textSakan, Kairat, Saule Nyssanbayeva, Nursulu Kapalova, Kunbolat Algazy, Ardabek Khompysh, and Dilmukhanbet Dyusenbayev. "Development and analysis of the new hashing algorithm based on block cipher." Eastern-European Journal of Enterprise Technologies 2, no. 9 (116) (2022): 60–73. http://dx.doi.org/10.15587/1729-4061.2022.252060.
Full textKairat, Sakan, Nyssanbayeva Saule, Kapalova Nursulu, Algazy Kunbolat, Khompysh Ardabek, and Dyusenbayev Dilmukhanbet. "Development and analysis of the new hashing algorithm based on block cipher." Eastern-European Journal of Enterprise Technologies 2, no. 9 (116) (2022): 60–73. https://doi.org/10.15587/1729-4061.2022.252060.
Full textZakaria, Nur Hafiza, Azuan Ahmad, Azni Haslizan Ab Halim, and Farida Hazwani Mohd Ridzuan. "SECURITY ANALYSIS BETWEEN STATIC AND DYNAMIC S-BOXES IN BLOCK CIPHERS." Journal of Information System and Technology Management 6, no. 20 (2021): 10–16. http://dx.doi.org/10.35631/jistm.620002.
Full textFigueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (2019): 4455. http://dx.doi.org/10.3390/s19204455.
Full textKlyucharev, P. G. "On Statistical Testing of Block Ciphers." Mathematics and Mathematical Modeling, no. 5 (November 12, 2018): 35–56. http://dx.doi.org/10.24108/mathm.0518.0000132.
Full textKhan, Muhammad Fahad, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, and Piyush Kumar Shukla. "Block Cipher’s Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight’s Tour Chain." Computational Intelligence and Neuroscience 2022 (May 20, 2022): 1–17. http://dx.doi.org/10.1155/2022/8338508.
Full textSamiullah, Muhammad, Waqar Aslam, Muhammad Asghar Khan, et al. "Rating of Modern Color Image Cryptography: A Next-Generation Computing Perspective." Wireless Communications and Mobile Computing 2022 (March 22, 2022): 1–20. http://dx.doi.org/10.1155/2022/7277992.
Full textOsemwegie, Omoruyi, Okereke Chinonso, Okokpujie Kennedy, Noma-Osaghae Etinosa, Okoyeigbo Obinna, and John Samuel. "Evaluation of the quality of an image encrytion scheme." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 6 (2020): 2968–74. https://doi.org/10.12928/TELKOMNIKA.v17i6.10488.
Full textNugrahtama, Aghnia Luthfy, and Yogha Restu Pramadi. "Implementation of salsa20 stream cipher algorithm as an alternative cipher suite SSL-VPN for VOIP security." IOP Conference Series: Materials Science and Engineering 508 (May 2, 2019): 012132. http://dx.doi.org/10.1088/1757-899x/508/1/012132.
Full textYeşiltepe, Mirsat, Beyza Yılmaz, Özge Yeni, and Muhammet Kurulay. "Sort of Turkey's top 20 banks by cipher suite value." Global Journal of Computer Science 5, no. 2 (2015): 74. http://dx.doi.org/10.18844/gjcs.v5i2.181.
Full textNagnath, B. Hulle, B. Prathiba, and R. Khope Sarika. "Compact Reconfigurable Architecture for Sosemanuk Stream Cipher." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 607–11. https://doi.org/10.35940/ijeat.C5252.029320.
Full textVenkataramanna, Ramya Kothur, Manjunatha Reddy Hosur Sriram, and Bharathi Chowda Reddy. "Advancing cryptography: a novel hybrid cipher design merging Feistel and SPN structures." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 751. http://dx.doi.org/10.11591/ijeecs.v35.i2.pp751-760.
Full textRamya, Kothur Venkataramanna Manjunatha Reddy Hosur Sriram Bharathi Chowda Reddy. "Advancing cryptography: a novel hybrid cipher design merging Feistel and SPN structures." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 751–60. https://doi.org/10.11591/ijeecs.v35.i2.pp751-760.
Full textAhmed O. Elrefai, Khaled A. Shehata, Hazem M. Eldeeb, and Hanady H. Issa. "ANCHOR: A New Proposed Stream Cipher for Smart Cards with Crypto Co-Processor." Journal of Advanced Research in Applied Sciences and Engineering Technology 45, no. 2 (2024): 227–39. http://dx.doi.org/10.37934/araset.45.2.227239.
Full textGeorge, Kiernan, and Alan J. Michaels. "Designing a Block Cipher in Galois Extension Fields for IoT Security." IoT 2, no. 4 (2021): 669–87. http://dx.doi.org/10.3390/iot2040034.
Full textBaldanzi, Luca, Luca Crocetti, Francesco Falaschi, et al. "Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm." Sensors 20, no. 7 (2020): 1869. http://dx.doi.org/10.3390/s20071869.
Full textHerzberg, Amir, and Haya Shulman. "Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?" IEEE Internet Computing 19, no. 1 (2015): 80–84. http://dx.doi.org/10.1109/mic.2015.3.
Full textYe, Jun, Yabing Chen, Fanglin An, and Weili Jiang. "ALICA: A Multi-S-Box Lightweight Cryptographic Algorithm Based on Generalized Feistel Structure." International Journal of Intelligent Systems 2023 (December 5, 2023): 1–13. http://dx.doi.org/10.1155/2023/6647416.
Full textAli Ebrahim, Seham Muawadh. "Hybrid Chaotic Method for Medical Images Ciphering." International Journal of Network Security & Its Applications 12, no. 6 (2020): 1–14. http://dx.doi.org/10.5121/ijnsa.2020.12601.
Full textSeham, Muawadh Ali Ebrahim. "HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING." International Journal of Network Security & Its Applications (IJNSA) 12, no. 06 (2020): 01–14. https://doi.org/10.5281/zenodo.4301344.
Full text