Artykuły w czasopismach na temat „Symmetric-key primitive”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Symmetric-key primitive”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Jang, Kyungbae, Yujin Oh, Hyunji Kim i Hwajeong Seo. "Quantum Implementation of AIM: Aiming for Low-Depth". Applied Sciences 14, nr 7 (27.03.2024): 2824. http://dx.doi.org/10.3390/app14072824.
Pełny tekst źródłaShaukat Jamal, Sajjad, Dawood Shah, Abdulaziz Deajim i Tariq Shah. "The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers". Security and Communication Networks 2020 (24.09.2020): 1–14. http://dx.doi.org/10.1155/2020/8883884.
Pełny tekst źródłaChalla, RatnaKumari, i VijayaKumari Gunta. "A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code". Baghdad Science Journal 18, nr 2(Suppl.) (20.06.2021): 0899. http://dx.doi.org/10.21123/bsj.2021.18.2(suppl.).0899.
Pełny tekst źródłaPartala, Juha. "Algebraic generalization of Diffie–Hellman key exchange". Journal of Mathematical Cryptology 12, nr 1 (1.03.2018): 1–21. http://dx.doi.org/10.1515/jmc-2017-0015.
Pełny tekst źródłaÁlvarez, Rafael, Alicia Andrade i Antonio Zamora. "Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption". Symmetry 10, nr 12 (3.12.2018): 705. http://dx.doi.org/10.3390/sym10120705.
Pełny tekst źródłaAlzahrani, Bander A., Ahmed Barnawi i Shehzad Ashraf Chaudhry. "A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems". Security and Communication Networks 2021 (5.11.2021): 1–12. http://dx.doi.org/10.1155/2021/3437373.
Pełny tekst źródłaBulbul, Salim Sabah, Zaid Ameen Abduljabbar, Duaa Fadhel Najem, Vincent Omollo Nyangaresi, Junchao Ma i Abdulla J. Y. Aldarwish. "Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control". Journal of Sensor and Actuator Networks 13, nr 1 (2.02.2024): 12. http://dx.doi.org/10.3390/jsan13010012.
Pełny tekst źródłakumar, N. Shantha, i Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks". International Journal of Soft Computing and Engineering 9, nr 4 (5.11.2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Pełny tekst źródłaLudyawati, Ludyawati, Muhammad Khudzaifah i Erna Herawati. "Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia". Jurnal Riset Mahasiswa Matematika 2, nr 6 (1.09.2023): 247–56. http://dx.doi.org/10.18860/jrmm.v2i6.22041.
Pełny tekst źródłaHuang, Jing Lian, Zhuo Wang i Mei Rong He. "Algebraic Immunity, Correlation Immunity and other Cryptographic Properties of Quadratic Rotation Symmetric Boolean Functions". Advanced Materials Research 989-994 (lipiec 2014): 2593–98. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2593.
Pełny tekst źródłaUeno, Rei, Naofumi Homma, Akiko Inoue i Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 1 (4.12.2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Pełny tekst źródłaNawaz, Yasir, i Lei Wang. "Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation". Symmetry 11, nr 12 (5.12.2019): 1485. http://dx.doi.org/10.3390/sym11121485.
Pełny tekst źródłaVizár, Damian. "The State of the Authenticated Encryption". Tatra Mountains Mathematical Publications 67, nr 1 (1.09.2016): 167–90. http://dx.doi.org/10.1515/tmmp-2016-0038.
Pełny tekst źródłaJang, Kyoungbae, Seungju Choi, Hyeokdong Kwon, Hyunji Kim, Jaehoon Park i Hwajeong Seo. "Grover on Korean Block Ciphers". Applied Sciences 10, nr 18 (14.09.2020): 6407. http://dx.doi.org/10.3390/app10186407.
Pełny tekst źródłaGe, Xuyang, Tim Li, Yuqing Wang i Melinda S. Peng. "Tropical Cyclone Energy Dispersion in a Three-Dimensional Primitive Equation Model: Upper-Tropospheric Influence*". Journal of the Atmospheric Sciences 65, nr 7 (1.07.2008): 2272–89. http://dx.doi.org/10.1175/2007jas2431.1.
Pełny tekst źródłaRoeser, T., S. Stein i M. Kessel. "Nuclear beta-catenin and the development of bilateral symmetry in normal and LiCl-exposed chick embryos". Development 126, nr 13 (1.07.1999): 2955–65. http://dx.doi.org/10.1242/dev.126.13.2955.
Pełny tekst źródłaBoura, Christina, Patrick Derbez i Margot Funk. "Related-Key Differential Analysis of the AES". IACR Transactions on Symmetric Cryptology 2023, nr 4 (8.12.2023): 215–43. http://dx.doi.org/10.46586/tosc.v2023.i4.215-243.
Pełny tekst źródłaLee, Byoungcheon. "Stateless Re-Association in WPA3 Using Paired Token". Electronics 10, nr 2 (19.01.2021): 215. http://dx.doi.org/10.3390/electronics10020215.
Pełny tekst źródłaMiraj, Muhammad Armaghan Faisal, Naveed Ahsan, Hamza Tariq, Shan Shahzad i Rana Faizan Saleem. "Fracture Pattern Analysis of the Upper Cretaceous-Eocene Carbonates along with the Ghumawan Dome, Hazara Basin". International Journal of Economic and Environmental Geology 12, nr 3 (16.11.2021): 6–10. http://dx.doi.org/10.46660/ijeeg.vol12.iss3.2021.612.
Pełny tekst źródłaHuang, Haiping, Qinglong Huang, Fu Xiao, Wenming Wang, Qi Li i Ting Dai. "An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains". Security and Communication Networks 2020 (1.09.2020): 1–17. http://dx.doi.org/10.1155/2020/8897282.
Pełny tekst źródłaMiraj, Muhammad Armaghan Faisal, Naveed Ahsan, Hamza Tariq, Shan Shahzad i Rana Faizan Saleem. "Fracture Pattern Analysis of the Upper Cretaceous-Eocene Carbonates along with the Ghumawan Dome, Hazara Basin". International Journal of Economic and Environmental Geology 12, nr 3 (11.03.2023): 6–10. http://dx.doi.org/10.46660/ijeeg.v12i3.55.
Pełny tekst źródłaSelby, John H., Carlo Maria Scandolo i Bob Coecke. "Reconstructing quantum theory from diagrammatic postulates". Quantum 5 (28.04.2021): 445. http://dx.doi.org/10.22331/q-2021-04-28-445.
Pełny tekst źródłaCao, Jing, Zuowei Wang i Alexei Likhtman. "Determining Tube Theory Parameters by Slip-Spring Model Simulations of Entangled Star Polymers in Fixed Networks". Polymers 11, nr 3 (14.03.2019): 496. http://dx.doi.org/10.3390/polym11030496.
Pełny tekst źródłaSakan, Kairat, Saule Nyssanbayeva, Nursulu Kapalova, Kunbolat Algazy, Ardabek Khompysh i Dilmukhanbet Dyusenbayev. "Development and analysis of the new hashing algorithm based on block cipher". Eastern-European Journal of Enterprise Technologies 2, nr 9 (116) (30.04.2022): 60–73. http://dx.doi.org/10.15587/1729-4061.2022.252060.
Pełny tekst źródłaZaverucha, Gregory M., i Douglas R. Stinson. "Anonymity in shared symmetric key primitives". Designs, Codes and Cryptography 57, nr 2 (20.01.2010): 139–60. http://dx.doi.org/10.1007/s10623-009-9357-0.
Pełny tekst źródłaDatta, Nilanjan, Shreya Dey, Avijit Dutta i Sougata Mandal. "Cascading Four Round LRW1 is Beyond Birthday Bound Secure". IACR Transactions on Symmetric Cryptology 2023, nr 4 (8.12.2023): 365–90. http://dx.doi.org/10.46586/tosc.v2023.i4.365-390.
Pełny tekst źródłaRuf, Armin, Tim Tetaz, Brigitte Schott, Catherine Joseph i Markus G. Rudolph. "Quadruple space-group ambiguity owing to rotational and translational noncrystallographic symmetry in human liver fructose-1,6-bisphosphatase". Acta Crystallographica Section D Structural Biology 72, nr 11 (28.10.2016): 1212–24. http://dx.doi.org/10.1107/s2059798316016715.
Pełny tekst źródłaLiu, Fukang, Abul Kalam, Santanu Sarkar i Willi Meier. "Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions". IACR Transactions on Symmetric Cryptology 2024, nr 1 (1.03.2024): 214–33. http://dx.doi.org/10.46586/tosc.v2024.i1.214-233.
Pełny tekst źródłaAbbas, Ghulam, Muhammad Tanveer, Ziaul Haq Abbas, Muhammad Waqas, Thar Baker i Dhiya Al-Jumeily OBE. "A secure remote user authentication scheme for 6LoWPAN-based Internet of Things". PLOS ONE 16, nr 11 (8.11.2021): e0258279. http://dx.doi.org/10.1371/journal.pone.0258279.
Pełny tekst źródłaAn, Yang, Yuejiao Zhang, Wenjun Cao, Zhiyan Tong i Zhangqing He. "A Lightweight and Practical Anonymous Authentication Protocol Based on Bit-Self-Test PUF". Electronics 11, nr 5 (2.03.2022): 772. http://dx.doi.org/10.3390/electronics11050772.
Pełny tekst źródłaSantoli, Thomas, i Christian Schaffner. "Using Simon's algorithm to attack symmetric-key cryptographic primitives". Quantum Information and Computation 17, nr 1&2 (styczeń 2017): 65–78. http://dx.doi.org/10.26421/qic17.1-2-4.
Pełny tekst źródłaAli, Asim, Muhammad Asif Khan, Ramesh Kumar Ayyasamy i Muhammad Wasif. "A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map". PeerJ Computer Science 8 (11.05.2022): e940. http://dx.doi.org/10.7717/peerj-cs.940.
Pełny tekst źródłaChakraborti, Avik, Nilanjan Datta i Mridul Nandi. "On the optimality of non-linear computations for symmetric key primitives". Journal of Mathematical Cryptology 12, nr 4 (1.12.2018): 241–59. http://dx.doi.org/10.1515/jmc-2017-0011.
Pełny tekst źródłaJin, Xin, Yuwei Duan, Ying Zhang, Yating Huang, Mengdong Li, Ming Mao, Amit Kumar Singh i Yujie Li. "Fast Search of Lightweight Block Cipher Primitives via Swarm-like Metaheuristics for Cyber Security". ACM Transactions on Internet Technology 21, nr 4 (16.07.2021): 1–15. http://dx.doi.org/10.1145/3417296.
Pełny tekst źródłaHussien, Hassan Mansur, Sharifah Md Yasin, Nur Izura Udzir i Mohd Izuan Hafez Ninggal. "Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage". Sensors 21, nr 7 (2.04.2021): 2462. http://dx.doi.org/10.3390/s21072462.
Pełny tekst źródłaChalla, Ratnakumari, i VijayaKumari Gunta. "Towards the Construction of Reed-Muller Code Based Symmetric Key FHE". Ingénierie des systèmes d information 26, nr 6 (27.12.2021): 585–90. http://dx.doi.org/10.18280/isi.260609.
Pełny tekst źródłaGoel, Aarushi, Matthew Green, Mathias Hall-Andersen i Gabriel Kaptchuk. "Efficient Set Membership Proofs using MPC-in-the-Head". Proceedings on Privacy Enhancing Technologies 2022, nr 2 (3.03.2022): 304–24. http://dx.doi.org/10.2478/popets-2022-0047.
Pełny tekst źródłaParmar, Keyur, i Devesh C. Jinwala. "Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks". Journal of Information Security 06, nr 01 (2015): 38–50. http://dx.doi.org/10.4236/jis.2015.61005.
Pełny tekst źródłaKaidalov, Dmytro, Roman Oliynykov i Oleksandr Kazymyrov. "A Method for Security Estimation of the Spn-Based Block Cipher Against Related-Key Attacks". Tatra Mountains Mathematical Publications 60, nr 1 (1.09.2014): 25–45. http://dx.doi.org/10.2478/tmmp-2014-0023.
Pełny tekst źródłaNyangaresi, Vincent Omollo, Zaid Ameen Abduljabbar, Keyan Abdul-Aziz Mutlaq, Junchao Ma, Dhafer G. Honi, Abdulla J. Y. Aldarwish i Iman Qays Abduljaleel. "Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes". Applied Sciences 12, nr 24 (11.12.2022): 12688. http://dx.doi.org/10.3390/app122412688.
Pełny tekst źródłaBanegas, Gustavo, Paulo S. L. M. Barreto, Edoardo Persichetti i Paolo Santini. "Designing Efficient Dyadic Operations for Cryptographic Applications". Journal of Mathematical Cryptology 14, nr 1 (19.06.2020): 95–109. http://dx.doi.org/10.1515/jmc-2015-0054.
Pełny tekst źródłaXiao, Yao, Lei Xu, Zikang Chen, Can Zhang i Liehuang Zhu. "A Blockchain-Based Data Sharing System with Enhanced Auditability". Mathematics 10, nr 23 (28.11.2022): 4494. http://dx.doi.org/10.3390/math10234494.
Pełny tekst źródłaLiu, Fukang, Mohammad Mahzoun, Morten Øygarden i Willi Meier. "Algebraic Attacks on RAIN and AIM Using Equivalent Representations". IACR Transactions on Symmetric Cryptology 2023, nr 4 (8.12.2023): 166–86. http://dx.doi.org/10.46586/tosc.v2023.i4.166-186.
Pełny tekst źródłaTomecek, Jozef. "Hardware optimizations of stream cipher rabbit". Tatra Mountains Mathematical Publications 50, nr 1 (1.12.2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Pełny tekst źródłaTeh, Tat-How, Chunchun Liu, Julian Wright i Junjie Zhou. "Multihoming and Oligopolistic Platform Competition". American Economic Journal: Microeconomics 15, nr 4 (1.11.2023): 68–113. http://dx.doi.org/10.1257/mic.20210324.
Pełny tekst źródłaMansoor, Khwaja, Anwar Ghani, Shehzad Chaudhry, Shahaboddin Shamshirband, Shahbaz Ghayyur i Amir Mosavi. "Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography". Sensors 19, nr 21 (1.11.2019): 4752. http://dx.doi.org/10.3390/s19214752.
Pełny tekst źródłaKuznetsov, О. О., Yu I. Горбенко, М. О. Poluyanenko, S. O. Kandiy i E. D. Matveeva. "Properties of the cost function in the iterative algorithm for generating nonlinear substitution". Radiotekhnika, nr 209 (24.06.2022): 16–28. http://dx.doi.org/10.30837/rt.2022.2.209.02.
Pełny tekst źródłaPonomar, Volodymyr, i Viktor Onoprienko. "Analysis of the possibility of using modern packages of computer algebra in the synthesis of crypto-primitives". Physico-mathematical modelling and informational technologies, nr 33 (4.09.2021): 128–32. http://dx.doi.org/10.15407/fmmit2021.33.128.
Pełny tekst źródłaLiu, Guoxiao, Keting Jia, Puwen Wei i Lei Ju. "High-Performance Hardware Implementation of MPCitH and Picnic3". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 2 (12.03.2024): 190–214. http://dx.doi.org/10.46586/tches.v2024.i2.190-214.
Pełny tekst źródłaXu, Wanshan, Jianbiao Zhang, Yilin Yuan, Xiao Wang, Yanhui Liu i Muhammad Irfan Khalid. "Towards efficient verifiable multi-keyword search over encrypted data based on blockchain". PeerJ Computer Science 8 (21.03.2022): e930. http://dx.doi.org/10.7717/peerj-cs.930.
Pełny tekst źródła