Academic literature on the topic 'Symmetric cryptosystems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Symmetric cryptosystems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Symmetric cryptosystems"
Alekseychuk, Anton, and Olha Shevchuk. "A necessary condition for CPA-security of randomized symmetric code cryptosystems." Physico-mathematical modelling and informational technologies, no. 33 (September 3, 2021): 78–82. http://dx.doi.org/10.15407/fmmit2021.33.078.
Full textKyaw, Myo Thu, Swar Hlaing Kyaw, and Aung Aung Nay. "Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems." International Journal of Trend in Scientific Research and Development 3, no. 6 (2019): 448–50. https://doi.org/10.5281/zenodo.3588011.
Full textHuang, Huawei. "Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices." Symmetry 14, no. 11 (2022): 2378. http://dx.doi.org/10.3390/sym14112378.
Full textChen, Ling Jiao, and Ao Dong Shen. "A Novel Public Key Image Cryptosystem Based on Elliptic Curve and Arnold Cat Map." Advanced Materials Research 989-994 (July 2014): 4183–86. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4183.
Full textZibideh, Walid Y., and Mustafa M. Matalgah. "Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time." International Journal of Information Security and Privacy 7, no. 1 (2013): 63–75. http://dx.doi.org/10.4018/jisp.2013010105.
Full textЄвсєєв, Сергій, Роман Корольов, Андрій Ткачов, and Анастасія Німченко. "DEVELOPMENT OF PROCEDURES FOR MODIFYING THE CIPHER GOST 28147." Advanced Information Systems 5, no. 2 (2021): 131–35. http://dx.doi.org/10.20998/2522-9052.2021.2.19.
Full textTODO, Yosuke. "Evolution of Symmetric-Key Cryptosystems." IEICE ESS Fundamentals Review 10, no. 1 (2016): 23–33. http://dx.doi.org/10.1587/essfr.10.1_23.
Full textVrahatis, M. N., G. A. Tsirogiannis, and E. C. Laskari. "Novel orbit based symmetric cryptosystems." Mathematical and Computer Modelling 51, no. 3-4 (2010): 239–46. http://dx.doi.org/10.1016/j.mcm.2009.08.011.
Full textLu, Cheng-Fen, and Shiuh-Pyng Shieh. "Re-keying algorithms for symmetric cryptosystems." Journal of Discrete Mathematical Sciences and Cryptography 7, no. 1 (2004): 23–27. http://dx.doi.org/10.1080/09720529.2004.10697985.
Full textTerrazas Gonzalez, Jesus D., and Witold Kinsner. "A Modular Dynamical Cryptosystem Based on Continuous-Interval Cellular Automata." International Journal of Cognitive Informatics and Natural Intelligence 5, no. 4 (2011): 83–109. http://dx.doi.org/10.4018/jcini.2011100106.
Full textDissertations / Theses on the topic "Symmetric cryptosystems"
Boiko, А., V. Shendryk, and L. Cherednichenko. "Verification of Cryptosystems Sustainability as the Main Criterion for Development of Common Information Security Policy." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/55749.
Full textДемченко, Є. В. "Методи криптографічного аналізу блочних алгоритмів". Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/75486.
Full textHouzelot, Agathe. "Analyse pratique de standards symétriques et asymétriques dans le contexte de la boîte blanche." Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0217.
Full textPortella, Rodrigo. "Balancing energy, security and circuit area in lightweight cryptographic hardware design." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE036/document.
Full textСамойлик, Євген Олександрович, та Yevgen Samoylik. "Лексикографічні методи захисту мовної інформації". Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/44637.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textAbubaker, Sarshad. "Probabilistic, lightweight cryptosystems based on finite automata." Thesis, 2011. http://hdl.handle.net/1828/3410.
Full textJedlicka, David Charles 1978. "On the suitability of power functions as S-boxes for symmetric cryptosystems." 2006. http://hdl.handle.net/2152/13052.
Full textCheng, Yen-hung, and 鄭彥鴻. "One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/23549679550177628322.
Full textHsieh, Chieh-Fu, and 謝杰甫. "An Application of Symmetric Cryptosystem on RFID Security." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/65074543725457425375.
Full textBooks on the topic "Symmetric cryptosystems"
Martin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.
Full textBook chapters on the topic "Symmetric cryptosystems"
Kaplan, Marc, Gaëtan Leurent, Anthony Leverrier, and María Naya-Plasencia. "Breaking Symmetric Cryptosystems Using Quantum Period Finding." In Advances in Cryptology – CRYPTO 2016. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53008-5_8.
Full textSanthi, H., P. Gayathri, Sanskar Katiyar, G. Gopichand, and Sagarika Shreevastava. "Study of Symmetric-Key Cryptosystems and Implementing a Secure Cryptosystem with DES." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3329-3_28.
Full textPatranabis, Sikhar, Abhishek Chakraborty, and Debdeep Mukhopadhyay. "Classical Fault Attacks on Public and Symmetric-Key Cryptosystems." In Fault Tolerant Architectures for Cryptography and Hardware Security. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-1387-4_2.
Full textRoelse, Peter. "Differential and Linear Distributions of Substitution Boxes for Symmetric-Key Cryptosystems." In Finite Fields with Applications to Coding Theory, Cryptography and Related Areas. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-59435-9_22.
Full textNi, Jinchao, Ziyan Liu, Ning Li, Cheng Zhang, Bo Cui, and Hanzhang Kong. "Protecting Web Application Code and Sensitive Data with Symmetric and Identity-Based Cryptosystems." In Communications in Computer and Information Science. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-5943-0_17.
Full textLi, Huorong, Jingqiang Lin, Bingyu Li, and Wangzhao Cheng. "PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX." In Information and Communications Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01950-1_47.
Full textKaliski, Burt. "Symmetric Cryptosystem." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_438.
Full textKaliski, Burt. "Symmetric Cryptosystem." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_438.
Full textPrakasha, Krishna, Rachana Kalkur, Vasundhara Acharya, Balachandra Muniyal, and Mayank Khandelwal. "A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5826-5_45.
Full textChandrasekaran, Jeyamala, B. Subramanyan, and Raman Selvanayagam. "A Chaos Based Approach for Improving Non Linearity in S Box Design of Symmetric Key Cryptosystems." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17878-8_52.
Full textConference papers on the topic "Symmetric cryptosystems"
Kim, Donnie H., Rajeev Gandhi, and Priya Narasimhan. "Castor: Secure Code Updates Using Symmetric Cryptosystems." In 28th IEEE International Real-Time Systems Symposium (RTSS 2007). IEEE, 2007. http://dx.doi.org/10.1109/rtss.2007.42.
Full textGrgic, Kresimir, Zoran Kovacevic, and Visnja Krizanovic Cik. "Performance analysis of symmetric block cryptosystems on Android platform." In 2017 International Conference on Smart Systems and Technologies (SST). IEEE, 2017. http://dx.doi.org/10.1109/sst.2017.8188687.
Full textGutub, Adnan Abdul-Aziz, and Farhan Abdul-Aziz Khan. "Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems." In 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 2012. http://dx.doi.org/10.1109/acsat.2012.44.
Full textXu, Shouhuai. "On the security of group communication schemes based on symmetric key cryptosystems." In the 3rd ACM workshop. ACM Press, 2005. http://dx.doi.org/10.1145/1102219.1102224.
Full textZibideh, W. Y., and M. M. Matalgah. "A comprehensive platform-independent computational complexity analysis for a class of symmetric cryptosystems." In 2013 International Conference on Computing, Networking and Communications (ICNC 2013). IEEE, 2013. http://dx.doi.org/10.1109/iccnc.2013.6504112.
Full textOuyang, Wenyi, Qiongxiao Wang, Wei Wang, Jingqiang Lin, and Yaxi He. "SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX." In 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC). IEEE, 2021. http://dx.doi.org/10.1109/ipccc51483.2021.9679452.
Full textChhabra, Surbhi, Vishakha Dhanwani, Vikas Kumar Dhaka, and Kusum Lata. "Design and Analysis of Secure One-way Functions for the Protection of Symmetric Key Cryptosystems." In 2020 24th International Symposium on VLSI Design and Test (VDAT). IEEE, 2020. http://dx.doi.org/10.1109/vdat50263.2020.9190432.
Full textKabulov, B. T., and N. B. Tashpulatova. "KETA: Public-key symmetric cryptosystem." In 2010 4th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2010. http://dx.doi.org/10.1109/icaict.2010.5612069.
Full textYang, X. B., and S. Boussakta. "A New Development of Symmetric Key Cryptosystem." In 2008 IEEE International Conference on Communications. IEEE, 2008. http://dx.doi.org/10.1109/icc.2008.299.
Full textZhang Jian-shi and Fang Zhi-yi. "Improvement on notarization protocol based on symmetric cryptosystem." In 2010 2nd International Conference on Computer Engineering and Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccet.2010.5485433.
Full text