Journal articles on the topic 'Symmetric cryptosystems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Symmetric cryptosystems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alekseychuk, Anton, and Olha Shevchuk. "A necessary condition for CPA-security of randomized symmetric code cryptosystems." Physico-mathematical modelling and informational technologies, no. 33 (September 3, 2021): 78–82. http://dx.doi.org/10.15407/fmmit2021.33.078.
Full textKyaw, Myo Thu, Swar Hlaing Kyaw, and Aung Aung Nay. "Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems." International Journal of Trend in Scientific Research and Development 3, no. 6 (2019): 448–50. https://doi.org/10.5281/zenodo.3588011.
Full textHuang, Huawei. "Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices." Symmetry 14, no. 11 (2022): 2378. http://dx.doi.org/10.3390/sym14112378.
Full textChen, Ling Jiao, and Ao Dong Shen. "A Novel Public Key Image Cryptosystem Based on Elliptic Curve and Arnold Cat Map." Advanced Materials Research 989-994 (July 2014): 4183–86. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4183.
Full textZibideh, Walid Y., and Mustafa M. Matalgah. "Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time." International Journal of Information Security and Privacy 7, no. 1 (2013): 63–75. http://dx.doi.org/10.4018/jisp.2013010105.
Full textЄвсєєв, Сергій, Роман Корольов, Андрій Ткачов, and Анастасія Німченко. "DEVELOPMENT OF PROCEDURES FOR MODIFYING THE CIPHER GOST 28147." Advanced Information Systems 5, no. 2 (2021): 131–35. http://dx.doi.org/10.20998/2522-9052.2021.2.19.
Full textTODO, Yosuke. "Evolution of Symmetric-Key Cryptosystems." IEICE ESS Fundamentals Review 10, no. 1 (2016): 23–33. http://dx.doi.org/10.1587/essfr.10.1_23.
Full textVrahatis, M. N., G. A. Tsirogiannis, and E. C. Laskari. "Novel orbit based symmetric cryptosystems." Mathematical and Computer Modelling 51, no. 3-4 (2010): 239–46. http://dx.doi.org/10.1016/j.mcm.2009.08.011.
Full textLu, Cheng-Fen, and Shiuh-Pyng Shieh. "Re-keying algorithms for symmetric cryptosystems." Journal of Discrete Mathematical Sciences and Cryptography 7, no. 1 (2004): 23–27. http://dx.doi.org/10.1080/09720529.2004.10697985.
Full textTerrazas Gonzalez, Jesus D., and Witold Kinsner. "A Modular Dynamical Cryptosystem Based on Continuous-Interval Cellular Automata." International Journal of Cognitive Informatics and Natural Intelligence 5, no. 4 (2011): 83–109. http://dx.doi.org/10.4018/jcini.2011100106.
Full textКорольов, Р. В., А. М. Ткачов, Н. І. Воропай, М. Мамедов, and Е. Багіров. "Development of an improved method for forming pseudorandom numbers based on redunte M-ary codes." Системи обробки інформації, no. 1 (168) (February 10, 2022): 29–35. http://dx.doi.org/10.30748/soi.2022.168.03.
Full textFúster-Sabater, Amparo, and M. E. Pazo-Robles. "Security Analysis of the Symmetric Cryptosystem TinyJambu." Symmetry 16, no. 4 (2024): 440. http://dx.doi.org/10.3390/sym16040440.
Full textMadhira, Srinivas, and Porika Sammulal. "Survey on Symmetric and Asymmetric Key Cryptosystems." IOSR Journal of Computer Engineering 16, no. 4 (2014): 11–18. http://dx.doi.org/10.9790/0661-16431118.
Full textAgrawal, Himani. "Implementation and analysis of various symmetric cryptosystems." Indian Journal of Science and Technology 3, no. 12 (2010): 1173–76. http://dx.doi.org/10.17485/ijst/2010/v3i12.25.
Full textHosoyamada, Akinori. "On post-quantum security of symmetric cryptosystems." IEICE ESS Fundamentals Review 17, no. 1 (2023): 59–71. http://dx.doi.org/10.1587/essfr.17.1_59.
Full textMohit, Prerna, and G. P. Biswas. "Modification of Traditional RSA into Symmetric-RSA Cryptosystems." International Journal of Business Data Communications and Networking 13, no. 1 (2017): 66–73. http://dx.doi.org/10.4018/ijbdcn.2017010106.
Full textDorninger, Dietmar, Helmut Länger, and Maciej Mączyński. "ON RING-LIKE STRUCTURES RELATED TO SYMMETRIC CRYPTOSYSTEMS." Demonstratio Mathematica 38, no. 2 (2005): 265–76. http://dx.doi.org/10.1515/dema-2005-0202.
Full textAgarwal, Sohit, and Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.
Full textJenifa Sabeena, S., and S. Antelin Vijila. "Moulded RSA and DES (MRDES) Algorithm for Data Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 2 (2023): 154–62. http://dx.doi.org/10.17762/ijritcc.v11i2.6140.
Full textSabeena, S. Jenifa, and S. Antelin Vijila. "Moulded RSA and DES (MRDES) Algorithm for Data Security." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 12 (2022): 12–20. http://dx.doi.org/10.17762/ijritcc.v10i12.5836.
Full textAli Shoukat, Ijaz, Kamalrulnizam Abu Bakar, and Subariah Ibrahim. "A Novel Dynamic Data Blocking Mechanism for Symmetric Cryptosystems." Research Journal of Applied Sciences, Engineering and Technology 7, no. 21 (2014): 4476–89. http://dx.doi.org/10.19026/rjaset.7.824.
Full textArora, Mani, Sandeep Sharma, and Derick Engles. "Parametric comparison of EMDS algorithm with some symmetric cryptosystems." Egyptian Informatics Journal 18, no. 2 (2017): 141–49. http://dx.doi.org/10.1016/j.eij.2016.11.004.
Full textI.M., Karimova. "METHODS FOR GENERATING KEYS FOR SYMMETRIC ENCRYPTION ALGORITHMS AND THEIR ANALYSIS." Results of National Scientific Research International Journal 4, no. 5 (2025): 180–90. https://doi.org/10.5281/zenodo.15581900.
Full textEjaz, Aisha, Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf, and Afshan Kanwal. "A secure key dependent dynamic substitution method for symmetric cryptosystems." PeerJ Computer Science 7 (July 19, 2021): e587. http://dx.doi.org/10.7717/peerj-cs.587.
Full textTom, Dr Joshua J., Dr Nlerum P. Anebo, Dr Bukola A. Onyekwelu, Adigwe Wilfred, and Richard E. Eyo. "Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems." International Journal of Engineering and Advanced Technology 12, no. 5 (2023): 25–38. http://dx.doi.org/10.35940/ijeat.e4153.0612523.
Full textDr., Joshua J. Tom, Nlerum P. Anebo Dr., Bukola A. Onyekwelu Dr., Wilfred Adigwe, and E. Eyo Richard. "Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 5 (2023): 25–38. https://doi.org/10.5281/zenodo.8073526.
Full textВамболь, Олексій Сергійович. "ВДОСКОНАЛЕНА ПОЛІНОМІАЛЬНО-СКЛАДНА АТАКА ВІДНОВЛЕННЯ ВІДКРИТОГО ТЕКСТУ НА РАНЦЕВИЙ ШИФР НА ОСНОВІ МАТРИЦЬ". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 3 (28 вересня 2020): 67–74. http://dx.doi.org/10.32620/reks.2020.3.07.
Full textMartsenyuk, V. P., A. S. Sverstyuk, I. Ye Andrushchak, and О. Yu Rechun. "Components and kay features of the analisis symmetric cryptocircuit." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 50 (March 31, 2023): 65–70. http://dx.doi.org/10.36910/6775-2524-0560-2023-50-09.
Full textChernyavskiy, A. F., E. I. Kozlova, and Yu A. Chernyavskiy. "Features of Structural Hardware Transformation of Information in Cryptosystems." Doklady BGUIR 22, no. 5 (2024): 80–88. http://dx.doi.org/10.35596/1729-7648-2024-22-5-80-88.
Full textChernyavskiy, A. F., E. I. Kozlova, and Yu A. Chernyavskiy. "Features of Structural Hardware Transformation of Information in Cryptosystems." Doklady BGUIR 22, no. 5 (2024): 80–88. http://dx.doi.org/10.35596/1729-7648-2024-22-5-80-88.
Full textHuang, Jing Lian, Zhuo Wang, and Mei Rong He. "Algebraic Immunity, Correlation Immunity and other Cryptographic Properties of Quadratic Rotation Symmetric Boolean Functions." Advanced Materials Research 989-994 (July 2014): 2593–98. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2593.
Full textJasim, Khalid F., and Akram M. Zeki. "Design of Protection Software Using Some Cryptosystems for Cloud Database Files." Cihan University-Erbil Scientific Journal 8, no. 1 (2024): 70–79. http://dx.doi.org/10.24086/cuesj.v8n1y2024.pp70-79.
Full textKrokhaleva, Y. N., and E. L. Krotova. "Comparative analysis of existing key exchange protocols for symmetric cryptosystems." Journal of the Ural Federal District. Information security 19, no. 4 (2019): 30–34. http://dx.doi.org/10.14529/secur190404.
Full textBodnia, Mykyta, Maryna Yesina, and Volodymyr Ponomar. "Researching the possibilities of using steganographic and cryptographic algorithms for information hiding." Computer Science and Cybersecurity, no. 2 (December 28, 2023): 43–57. http://dx.doi.org/10.26565/2519-2310-2023-2-05.
Full textAvramenko, Viktor, and Volodymyr Demianenko. "Serial encryption using the functions of real variable." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 2 (June 2, 2021): 39–50. http://dx.doi.org/10.32620/reks.2021.2.04.
Full textChukwudi, Ashioba Nwanze, Emma-Osiebe Obaro, Ogbodhu Charles Uzoma-Odoji-Kpasa, and Ndubuife Nonso Daniel. "Modeling Diffie Hellman Key Exchange Algorithm using Object-Oriented Analysis and Design Technique." International Journal on Cryptography and Information Security 14, no. 2 (2024): 01–08. http://dx.doi.org/10.5121/ijcis.2024.14201.
Full textJeddi, Zahra, Ahmed Khattab, Esmaeil Amini, and Madgy Bayoumi. "Redundant Bit Security in RFIDs: Architecture Design and Security Performance Evaluation." Journal of Circuits, Systems and Computers 26, no. 09 (2017): 1750138. http://dx.doi.org/10.1142/s0218126617501389.
Full textKinganga, Joel, Nathanael Kasoro, and Alain Musesa. "Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data." Al-Mustansiriyah Journal of Science 36, no. 1 (2025): 56–68. https://doi.org/10.23851/mjs.v36i1.1616.
Full textKrishna, B. Murali, Chella Santhosh, and S. K. Khasimbee. "FPGA Implementation of High-Performance s-box Model and Bit-level Masking for AES Cryptosystem." International Journal of Electrical and Electronics Research 10, no. 2 (2022): 171–76. http://dx.doi.org/10.37391/ijeer.100221.
Full textGrote, Olaf, and Andreas Ahrens. "Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution." Electrical, Control and Communication Engineering 18, no. 1 (2022): 43–49. http://dx.doi.org/10.2478/ecce-2022-0006.
Full textEid Khamees Al-Shammary, Mohammed, and Sufyan Salim Mahmood Al-Dabbagh. "Differential Distribution Table implementation DDT survey." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 10 (2022): 15–30. http://dx.doi.org/10.47577/technium.v4i10.7700.
Full textHashim, HayderRaheem, and Mohammed Abdul Hameed JasemAlkufi. "A Proposed Method for Text Encryption using Symmetric and Asymmetric Cryptosystems." International Journal of Computer Trends and Technology 50, no. 2 (2017): 94–100. http://dx.doi.org/10.14445/22312803/ijctt-v50p117.
Full textMelenti, Yevhen, Olha Korol, Volodymyr Shulha, et al. "Development of post-quantum cryptosystems based on the Rao-Nam scheme." Eastern-European Journal of Enterprise Technologies 1, no. 9 (133) (2025): 35–48. https://doi.org/10.15587/1729-4061.2025.323195.
Full textAldali, Musab A., Hesham Saleh Almssmari, and Mustafa M. Salama. "Comparative Analysis of the RSA and AES Algorithms as Data Cryptosystems." International Science and Technology Journal 34, no. 2 (2024): 1–14. http://dx.doi.org/10.62341/mhmc3027.
Full textTomashevsky, Bogdan, Serhii Yevseiev, Serhii Pohasii, and Stanislav Milevskyi. "MECHANISMS FOR ENSURING THE SECURITY OF CHANNELS OF A PROSPECTIVE MANAGEMENT SYSTEM." Advanced Information Systems 6, no. 3 (2022): 66–82. http://dx.doi.org/10.20998/2522-9052.2022.3.10.
Full textNair, Divya J. "A Synoptic View on Network Security and Cryptography." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (2021): 2102–4. http://dx.doi.org/10.22214/ijraset.2021.38339.
Full textSachin, Ravi Kumar, Sakshi, et al. "Advances in Optical Visual Information Security: A Comprehensive Review." Photonics 11, no. 1 (2024): 99. http://dx.doi.org/10.3390/photonics11010099.
Full textWang, Yongjuan, Guangpu Gao, and Qingjun Yuan. "Searching for Cryptographically Significant Rotation Symmetric Boolean Functions by Designing Heuristic Algorithms." Security and Communication Networks 2022 (March 27, 2022): 1–6. http://dx.doi.org/10.1155/2022/8188533.
Full textЦиганенко, О. С. "Development of digital signature algorithm based on the Niederriter crypto-code system." Системи обробки інформації, no. 3(162), (September 30, 2020): 86–94. http://dx.doi.org/10.30748/soi.2020.162.09.
Full textBabenko, Ludmila, and Alina Trepacheva. "Towards Unsecurity of Two Homomorphic Encryptions Based on Residue System." SPIIRAS Proceedings 18, no. 1 (2019): 230–62. http://dx.doi.org/10.15622/sp.18.1.230-262.
Full text