Journal articles on the topic 'Secret-key cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secret-key cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Shuiyin, Yi Hong, and Emanuele Viterbo. "Unshared Secret Key Cryptography." IEEE Transactions on Wireless Communications 13, no. 12 (December 2014): 6670–83. http://dx.doi.org/10.1109/twc.2014.2364022.
Full textNAGY, NAYA, MARIUS NAGY, and SELIM G. AKL. "KEY DISTRIBUTION VERSUS KEY ENHANCEMENT IN QUANTUM CRYPTOGRAPHY." Parallel Processing Letters 20, no. 03 (September 2010): 239–50. http://dx.doi.org/10.1142/s0129626410000193.
Full textJoye, Marc, and Sung-Ming Yen. "ID-based secret-key cryptography." ACM SIGOPS Operating Systems Review 32, no. 4 (October 1998): 33–39. http://dx.doi.org/10.1145/302350.302359.
Full textKak, S. C. "Secret-hardware public-key cryptography." IEE Proceedings E Computers and Digital Techniques 133, no. 2 (1986): 94. http://dx.doi.org/10.1049/ip-e.1986.0010.
Full textMakeri, Yakubu Ajiji. "INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT." Acta Informatica Malaysia 4, no. 1 (May 18, 2020): 19–21. http://dx.doi.org/10.26480/aim.01.2020.19.21.
Full textDubey, Praveer, and Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography." International Journal of Current Engineering and Technology 10, no. 06 (October 31, 2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.
Full textBachman, Dale J., Ezra A. Brown, and Anderson H. Norton. "Chocolate Key Cryptography." Mathematics Teacher 104, no. 2 (September 2010): 100–104. http://dx.doi.org/10.5951/mt.104.2.0100.
Full textBachman, Dale J., Ezra A. Brown, and Anderson H. Norton. "Chocolate Key Cryptography." Mathematics Teacher 104, no. 2 (September 2010): 100–104. http://dx.doi.org/10.5951/mt.104.2.0100.
Full textAnilkumar, Chunduru, Swathi Lenka, N. Neelima, and Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution." Scalable Computing: Practice and Experience 25, no. 1 (January 4, 2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.
Full textDayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.
Full textMukhammadovich, Nurullaev Mirkhon, and Aloev Rakhmatillo Djuraevich. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (February 1, 2023): 911. http://dx.doi.org/10.11591/ijece.v13i1.pp911-919.
Full textSeredynski, Franciszek, Pascal Bouvry, and Albert Y. Zomaya. "Cellular automata computations and secret key cryptography." Parallel Computing 30, no. 5-6 (May 2004): 753–66. http://dx.doi.org/10.1016/j.parco.2003.12.014.
Full textZhang, Guoyan. "Secret Key-Awareness Secure in Certificateless Cryptography." Procedia Environmental Sciences 10 (2011): 633–39. http://dx.doi.org/10.1016/j.proenv.2011.09.102.
Full textI, Arshiya, and Sekar R. "Securing M2m Post-Quantum Secret Key Cryptography." IOSR Journal of Electronics and Communication Engineering 9, no. 1 (2014): 22–27. http://dx.doi.org/10.9790/2834-09132227.
Full textOctora Ginting, Ferraro S., Veithzal Rivai Zainal, and Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization." Journal of Accounting and Finance Management 3, no. 6 (February 19, 2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.
Full textMaram, Balajee, Y. Ramesh Kumar, and K. Lakshmana Rao. "NARSKCA: Novel and robust symmetric key cryptography algorithm." International Journal of Scientific World 3, no. 2 (September 5, 2015): 244. http://dx.doi.org/10.14419/ijsw.v3i2.5111.
Full textAlqadi, Ziad. "Comparative Analysis of using SIK for Message Cryptography." International Journal of Computer Science and Mobile Computing 12, no. 8 (August 30, 2023): 45–57. http://dx.doi.org/10.47760/ijcsmc.2023.v12i08.006.
Full textGeetha, M., and K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS." IJISCS (International Journal of Information System and Computer Science) 2, no. 3 (March 14, 2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Full textTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server." Information Technology And Control 49, no. 4 (December 19, 2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Full textNong Phuong Trang and Luu Hong Dung. "A type of public - key block cipher algorithm." Journal of Military Science and Technology, CSCE7 (December 30, 2023): 50–60. http://dx.doi.org/10.54939/1859-1043.j.mst.csce7.2023.49-59.
Full textKaushik, Bharti, Vikas Malik, and Vinod Saroha. "A Review Paper on Data Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.
Full textNovianti, Chofifah Alfin, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks." Jurnal Riset Mahasiswa Matematika 3, no. 1 (October 31, 2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.
Full textMankovskyy, S., and Yu Matiieshyn. "PYTHON MODEL OF SECRET KEY AGREEMENT IN THE GROUP OF ARBITRARY NUMBER OF PARTICIPANTS." Information and communication technologies, electronic engineering 4, no. 1 (May 12, 2024): 93–101. http://dx.doi.org/10.23939/ictee2024.01.093.
Full textSasongko, Arif, Hidayat Hidayat, Yusuf Kurniawan, and Sarwono Sutikno. "Architecture for the Secret-Key Bc3 Cryptography Algorithm." ITB Journal of Information and Communication Technology 5, no. 2 (2011): 125–40. http://dx.doi.org/10.5614/itbj.ict.2011.5.2.4.
Full textNguyen, Thi-Nhung. "Privacy preserving using extended euclidean – algorithm applied to RSA." Tạp chí Khoa học - Trường Đại học Sư phạm Hà Nội 2 1, no. 2 (April 28, 2023): 53–63. http://dx.doi.org/10.56764/hpu2.jos.2023.1.2.53-63.
Full textChen, Jingyu, Haitao Deng, Huachang Su, Minghao Yuan, and Yongjun Ren. "Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey." Electronics 13, no. 2 (January 8, 2024): 287. http://dx.doi.org/10.3390/electronics13020287.
Full textHuang, Jianye, Qiong Huang, and Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Full textAbushgra, Abdulbast A. "Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review." Cryptography 6, no. 1 (March 4, 2022): 12. http://dx.doi.org/10.3390/cryptography6010012.
Full textIncze, Arpad. "Pixel-sieve cryptographic primitives with LSB steganography." Global Journal of Information Technology: Emerging Technologies 7, no. 1 (June 27, 2017): 14–22. http://dx.doi.org/10.18844/gjit.v7i1.1934.
Full textShankar, K., and P. Eswaran. "RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique." Journal of Circuits, Systems and Computers 25, no. 11 (August 14, 2016): 1650138. http://dx.doi.org/10.1142/s0218126616501383.
Full textParuchuri, Vijaya Lakshmi, Dr R. Sridevi, and K. S. SadaSiva Rao. "Image Steganography combined with Cryptography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 1 (July 15, 2013): 976–84. http://dx.doi.org/10.24297/ijct.v9i1.4160.
Full textWANG, XINGYUAN, CHAOFENG DUAN, and NINI GU. "A NEW CHAOTIC CRYPTOGRAPHY BASED ON ERGODICITY." International Journal of Modern Physics B 22, no. 07 (March 20, 2008): 901–8. http://dx.doi.org/10.1142/s0217979208038983.
Full textR, Nesamalar, and Dr Ravikumar K. "Proficient and Safe Token with Secret and Public Keys Sharing Algorithm for Preventing Cryptographic Key Leakage in Wireless Sensor Network." International Journal of Engineering Research in Electronics and Communication Engineering 9, no. 9 (August 30, 2022): 1–6. http://dx.doi.org/10.36647/ijerece/09.09.a001.
Full textG. S . Wijesiri, P. A. S. D. Perera,. "Encryption and Decryption Algorithms in Symmetric Key Cryptography Using Graph Theory." Psychology and Education Journal 58, no. 1 (January 1, 2021): 3420–27. http://dx.doi.org/10.17762/pae.v58i1.1280.
Full textAlqadi, Ziad, Yousif Eltous, and Amjad Al Hindi. "Secure, Image based Private Key for Secret Message Cryptography." International Journal of Computer Applications 183, no. 41 (December 22, 2021): 1–8. http://dx.doi.org/10.5120/ijca2021921802.
Full textKr. Naskar, Prabir, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, and Atal Chaudhuri. "Shared Cryptography with Embedded Session Key for Secret Audio." International Journal of Computer Applications 26, no. 8 (July 31, 2011): 5–9. http://dx.doi.org/10.5120/3128-4305.
Full textUtami, Widya Catur, Rini Marwati, and Sumanang Muhtar Gozali. "PENGGABUNGAN KRIPTOGRAFI RIVEST SHAMIR ADLEMAN (RSA) DAN ADVANCED ENCRYPTION STANDARD (AES) PADA APLIKASI PENGIRIM E-MAIL." Interval : Jurnal Ilmiah Matematika 3, no. 2 (March 1, 2024): 92–101. http://dx.doi.org/10.33751/interval.v3i2.8845.
Full textPal, S., B. Datta, and A. Karmakar. "An Artificial Neural Network Technique of Modern Cryptography." Journal of Scientific Research 14, no. 2 (May 6, 2022): 471–81. http://dx.doi.org/10.3329/jsr.v14i2.55669.
Full textMukhtar, Naila, Mohamad Mehrabi, Yinan Kong, and Ashiq Anjum. "Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor." Applied Sciences 9, no. 1 (December 25, 2018): 64. http://dx.doi.org/10.3390/app9010064.
Full textAyo-Aderele, A. O., S. O. Edeki, V. O. Udjor, and O. Ugbenu. "A note on matrix algebra for cryptography settings and applications." Journal of Physics: Conference Series 2199, no. 1 (February 1, 2022): 012016. http://dx.doi.org/10.1088/1742-6596/2199/1/012016.
Full textDewi, Ratna, and Putri Kartika Sari. "The Improvement of Flip (2,2) Visual Cryptography Images Using Two Key Images." ComTech: Computer, Mathematics and Engineering Applications 7, no. 3 (September 30, 2016): 213. http://dx.doi.org/10.21512/comtech.v7i3.2501.
Full textSaputra, Joni, Herliana Rosika, and M. Afriasyah. "Implementation Of Current Algorithm With Fibonnaci Series And Hexagonal Formula To Encode Messages." SainsTech Innovation Journal 4, no. 2 (November 1, 2021): 134–38. http://dx.doi.org/10.37824/sij.v4i2.2021.270.
Full textKynshi, Junestarfield, and Deepa Jose. "Enhanced Content Based Double Encryption Algorithm Using Symmetric Key Cryptography." Oriental journal of computer science and technology 10, no. 2 (April 7, 2017): 345–51. http://dx.doi.org/10.13005/ojcst/10.02.13.
Full textShah, Aayush, Prabhat Mahato, and Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Full textAl Rubaie, Salwan Fadhel, and Maher K. Mahmood Al-Azawi. "High capacity double precision image steganography based on chaotic maps." Bulletin of Electrical Engineering and Informatics 13, no. 1 (February 1, 2024): 320–31. http://dx.doi.org/10.11591/eei.v13i1.6055.
Full textChallarapu, Neelima, and Suneetha Chivukula. "Elliptic Curve Cryptography Applied for (k,n) Threshold Secret Sharing Scheme." ECS Transactions 107, no. 1 (April 24, 2022): 1021–28. http://dx.doi.org/10.1149/10701.1021ecst.
Full textZhang, Hongliang, Dongxiao Quan, Changhua Zhu, and Zhigang Li. "A Quantum Cryptography Communication Network Based on Software Defined Network." ITM Web of Conferences 17 (2018): 01008. http://dx.doi.org/10.1051/itmconf/20181701008.
Full textNiko Surya Atmaja. "Symmetric Cryptography Modification Using Diffie Hellman On RDBMS." Journal of Information Technology, computer science and Electrical Engineering 1, no. 1 (February 29, 2024): 40–48. http://dx.doi.org/10.61306/jitcse.v1i1.7.
Full textAlqadi, Ziad. "Improving Standard Methods of Message Cryptography." International Journal of Computer Science and Mobile Computing 11, no. 11 (November 30, 2022): 13–30. http://dx.doi.org/10.47760/ijcsmc.2022.v11i11.003.
Full textS.N.Chakravarthy, A., and T. Anjikumar. "A Novel Symmetric Key Cryptography using Multiple Random Secret Keys." International Journal of Computer Applications 80, no. 16 (October 18, 2013): 27–32. http://dx.doi.org/10.5120/13954-1890.
Full text