Journal articles on the topic 'Secret-key cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secret-key cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Shuiyin, Yi Hong, and Emanuele Viterbo. "Unshared Secret Key Cryptography." IEEE Transactions on Wireless Communications 13, no. 12 (2014): 6670–83. http://dx.doi.org/10.1109/twc.2014.2364022.
Full textGirija, Rani Suthoju, and Suresh babu M. "Cryptographic Services to Enforce Secure Messaging and Data Storage." International Journal of Innovative Science and Research Technology 7, no. 11 (2022): 1693–96. https://doi.org/10.5281/zenodo.7478875.
Full textNAGY, NAYA, MARIUS NAGY, and SELIM G. AKL. "KEY DISTRIBUTION VERSUS KEY ENHANCEMENT IN QUANTUM CRYPTOGRAPHY." Parallel Processing Letters 20, no. 03 (2010): 239–50. http://dx.doi.org/10.1142/s0129626410000193.
Full textJoye, Marc, and Sung-Ming Yen. "ID-based secret-key cryptography." ACM SIGOPS Operating Systems Review 32, no. 4 (1998): 33–39. http://dx.doi.org/10.1145/302350.302359.
Full textKak, S. C. "Secret-hardware public-key cryptography." IEE Proceedings E Computers and Digital Techniques 133, no. 2 (1986): 94. http://dx.doi.org/10.1049/ip-e.1986.0010.
Full textSeptafiansyah, Dwi Putra, Yudhiprawira Mario, Sutikno Sarwono, Kurniawan Yusuf, and Suwandi Ahmad Adang. "Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1282–89. https://doi.org/10.12928/TELKOMNIKA.v17i3.9384.
Full textMakeri, Yakubu Ajiji. "INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT." Acta Informatica Malaysia 4, no. 1 (2020): 19–21. http://dx.doi.org/10.26480/aim.01.2020.19.21.
Full textPallavi, Vijay Chavan, Mohammad Atique Dr., and Latesh Malik Dr. "Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares." International Journal of Network Security & Its Applications (IJNSA) 6, no. 1 (2014): 91–102. https://doi.org/10.5281/zenodo.6471758.
Full textSagala, Sarah. "Application of Diffie-Hellman Algorithm Method (Key-Exchange) in Cryptography." Login : Jurnal Teknologi Komputer 18, no. 02 (2024): 114–19. https://doi.org/10.58471/login.v18i02.114.
Full textDubey, Praveer, and Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography." International Journal of Current Engineering and Technology 10, no. 06 (2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Full textBachman, Dale J., Ezra A. Brown, and Anderson H. Norton. "Chocolate Key Cryptography." Mathematics Teacher 104, no. 2 (2010): 100–104. http://dx.doi.org/10.5951/mt.104.2.0100.
Full textBachman, Dale J., Ezra A. Brown, and Anderson H. Norton. "Chocolate Key Cryptography." Mathematics Teacher 104, no. 2 (2010): 100–104. http://dx.doi.org/10.5951/mt.104.2.0100.
Full textAnilkumar, Chunduru, Swathi Lenka, N. Neelima, and Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution." Scalable Computing: Practice and Experience 25, no. 1 (2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Full textDayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.
Full textSeredynski, Franciszek, Pascal Bouvry, and Albert Y. Zomaya. "Cellular automata computations and secret key cryptography." Parallel Computing 30, no. 5-6 (2004): 753–66. http://dx.doi.org/10.1016/j.parco.2003.12.014.
Full textZhang, Guoyan. "Secret Key-Awareness Secure in Certificateless Cryptography." Procedia Environmental Sciences 10 (2011): 633–39. http://dx.doi.org/10.1016/j.proenv.2011.09.102.
Full textI, Arshiya, and Sekar R. "Securing M2m Post-Quantum Secret Key Cryptography." IOSR Journal of Electronics and Communication Engineering 9, no. 1 (2014): 22–27. http://dx.doi.org/10.9790/2834-09132227.
Full textMukhammadovich, Nurullaev Mirkhon, and Aloev Rakhmatillo Djuraevich. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 911. http://dx.doi.org/10.11591/ijece.v13i1.pp911-919.
Full textNurullaev, Mirkhon Mukhammadovich, and Rakhmatillo Djuraevich Aloev. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 911–19. https://doi.org/10.11591/ijece.v13i1.pp911-919.
Full textAlqadi, Ziad. "Comparative Analysis of using SIK for Message Cryptography." International Journal of Computer Science and Mobile Computing 12, no. 8 (2023): 45–57. http://dx.doi.org/10.47760/ijcsmc.2023.v12i08.006.
Full textCaleg Sadrak Sinaga, Alwi Findo Gultom, Dewi Ruth Nababan, Ari Rivaldo Simanjuntak, and Edi Ginting. "Cryptography With Mceliece Algorithm (Code Based Cryptography)." Jurnal Teknik Indonesia 3, no. 02 (2024): 49–53. https://doi.org/10.58471/ju-ti.v3i02.665.
Full textOctora Ginting, Ferraro S., Veithzal Rivai Zainal, and Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization." Journal of Accounting and Finance Management 3, no. 6 (2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.
Full textMinal, Lopes1 and Dr. Nisha Sarwade2. "Cryptography from Quantum Mechanical Viewpoint." International Journal on Cryptography and Information Security (IJCIS) 4, no. 2 (2014): 13. https://doi.org/10.5281/zenodo.7379782.
Full textMaram, Balajee, Y. Ramesh Kumar, and K. Lakshmana Rao. "NARSKCA: Novel and robust symmetric key cryptography algorithm." International Journal of Scientific World 3, no. 2 (2015): 244. http://dx.doi.org/10.14419/ijsw.v3i2.5111.
Full textTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server." Information Technology And Control 49, no. 4 (2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Full textGeetha, M., and K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS." IJISCS (International Journal of Information System and Computer Science) 2, no. 3 (2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Full textNong Phuong Trang and Luu Hong Dung. "A type of public - key block cipher algorithm." Journal of Military Science and Technology, CSCE7 (December 30, 2023): 50–60. http://dx.doi.org/10.54939/1859-1043.j.mst.csce7.2023.49-59.
Full textSubhalaxmi Sabitri Das, Subhalaxmi Sabitri Das, Sachin Jena Sachin Jena, and H. Dipali Singh H.Dipali Singh. "The Role of Cryptography in Cyber Security." International Journal of Engineering and Science Invention 14, no. 5 (2025): 48–54. https://doi.org/10.35629/6734-14054854.
Full textKaushik, Bharti, Vikas Malik, and Vinod Saroha. "A Review Paper on Data Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.
Full textNovianti, Chofifah Alfin, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks." Jurnal Riset Mahasiswa Matematika 3, no. 1 (2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.
Full textMankovskyy, S., and Yu Matiieshyn. "PYTHON MODEL OF SECRET KEY AGREEMENT IN THE GROUP OF ARBITRARY NUMBER OF PARTICIPANTS." Information and communication technologies, electronic engineering 4, no. 1 (2024): 93–101. http://dx.doi.org/10.23939/ictee2024.01.093.
Full textNguyen, Thi-Nhung. "Privacy preserving using extended euclidean – algorithm applied to RSA." Tạp chí Khoa học - Trường Đại học Sư phạm Hà Nội 2 1, no. 2 (2023): 53–63. http://dx.doi.org/10.56764/hpu2.jos.2023.1.2.53-63.
Full textSasongko, Arif, Hidayat Hidayat, Yusuf Kurniawan, and Sarwono Sutikno. "Architecture for the Secret-Key Bc3 Cryptography Algorithm." ITB Journal of Information and Communication Technology 5, no. 2 (2011): 125–40. http://dx.doi.org/10.5614/itbj.ict.2011.5.2.4.
Full textHuang, Jianye, Qiong Huang, and Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting." International Journal of Foundations of Computer Science 28, no. 06 (2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Full textChen, Jingyu, Haitao Deng, Huachang Su, Minghao Yuan, and Yongjun Ren. "Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey." Electronics 13, no. 2 (2024): 287. http://dx.doi.org/10.3390/electronics13020287.
Full textThottempudi, Pardhu, Sateesh R., Naveen K., and Mani Raj K. "Implementation of Steganographic Algorithms Based on Exact Histogram Matching and Colour Visual Cryptography." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 519–22. https://doi.org/10.35940/ijeat.B3006.129219.
Full textShankar, K., and P. Eswaran. "RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique." Journal of Circuits, Systems and Computers 25, no. 11 (2016): 1650138. http://dx.doi.org/10.1142/s0218126616501383.
Full textAbushgra, Abdulbast A. "Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review." Cryptography 6, no. 1 (2022): 12. http://dx.doi.org/10.3390/cryptography6010012.
Full textParuchuri, Vijaya Lakshmi, Dr R. Sridevi, and K. S. SadaSiva Rao. "Image Steganography combined with Cryptography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 1 (2013): 976–84. http://dx.doi.org/10.24297/ijct.v9i1.4160.
Full textIncze, Arpad. "Pixel-sieve cryptographic primitives with LSB steganography." Global Journal of Information Technology: Emerging Technologies 7, no. 1 (2017): 14–22. http://dx.doi.org/10.18844/gjit.v7i1.1934.
Full textAnirban, Bhowmik, Karforma Sunil, and Dey Joydeep. "Recurrence relation and DNA sequence: A state-of-art technique for secret sharing." International Journal of Reconfigurable and Embedded Systems 10, no. 1 (2021): 65–76. https://doi.org/10.11591/ijres.v10.i1.pp65-76.
Full textR, Nesamalar, and Dr Ravikumar K. "Proficient and Safe Token with Secret and Public Keys Sharing Algorithm for Preventing Cryptographic Key Leakage in Wireless Sensor Network." International Journal of Engineering Research in Electronics and Communication Engineering 9, no. 9 (2022): 1–6. http://dx.doi.org/10.36647/ijerece/09.09.a001.
Full textWANG, XINGYUAN, CHAOFENG DUAN, and NINI GU. "A NEW CHAOTIC CRYPTOGRAPHY BASED ON ERGODICITY." International Journal of Modern Physics B 22, no. 07 (2008): 901–8. http://dx.doi.org/10.1142/s0217979208038983.
Full textInternational, Journal of Computer Science Engineering and Applications (IJCSEA). "A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication." International Journal of Computer Science, Engineering and Applications (IJCSEA) 1, no. 1 (2024): 1–10. https://doi.org/10.5281/zenodo.14189740.
Full textG. S . Wijesiri, P. A. S. D. Perera,. "Encryption and Decryption Algorithms in Symmetric Key Cryptography Using Graph Theory." Psychology and Education Journal 58, no. 1 (2021): 3420–27. http://dx.doi.org/10.17762/pae.v58i1.1280.
Full textAbu, Salim, Tripathi Sachin, and Kumar Tiwari Rajesh. "APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE ACCESS CONTROL IN THE CLOUD." International Journal of Computer Networks & Communications (IJCNC) 11, no. 4 (2019): 121–35. https://doi.org/10.5281/zenodo.3445799.
Full textAlqadi, Ziad, Yousif Eltous, and Amjad Al Hindi. "Secure, Image based Private Key for Secret Message Cryptography." International Journal of Computer Applications 183, no. 41 (2021): 1–8. http://dx.doi.org/10.5120/ijca2021921802.
Full textKr. Naskar, Prabir, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, and Atal Chaudhuri. "Shared Cryptography with Embedded Session Key for Secret Audio." International Journal of Computer Applications 26, no. 8 (2011): 5–9. http://dx.doi.org/10.5120/3128-4305.
Full textSholihat Ruhaedi, Hedy, and Alam Rahmatulloh. "DATA SECURITY SCHEME WITH A COMBINATION OF ADVANCED ENCRYPTION STANDARD (AES) AND RIVEST SHAMIR ALDEMAN (RSA) ALGORITHMS." Antivirus : Jurnal Ilmiah Teknik Informatika 18, no. 2 (2024): 177–90. https://doi.org/10.35457/antivirus.v18i2.3369.
Full textAl-Saleh, Salah Mohammed, Hind Alhusban, Shatha Fawaz abd Alrahim Ghazal, Reem S. Khaldi, Saad Musa Ali Khalifah, and Amal Abdelfattah Rabah Alsedawi. "MRBM Reordering for Efficient Secret Message Cryptography." International Journal of Computer Science and Mobile Computing 13, no. 7 (2024): 1–11. http://dx.doi.org/10.47760/ijcsmc.2024.v13i07.001.
Full text