Artigos de revistas sobre o tema "Symmetric-key primitive"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Symmetric-key primitive".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Jang, Kyungbae, Yujin Oh, Hyunji Kim e Hwajeong Seo. "Quantum Implementation of AIM: Aiming for Low-Depth". Applied Sciences 14, n.º 7 (27 de março de 2024): 2824. http://dx.doi.org/10.3390/app14072824.
Texto completo da fonteShaukat Jamal, Sajjad, Dawood Shah, Abdulaziz Deajim e Tariq Shah. "The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers". Security and Communication Networks 2020 (24 de setembro de 2020): 1–14. http://dx.doi.org/10.1155/2020/8883884.
Texto completo da fonteChalla, RatnaKumari, e VijayaKumari Gunta. "A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code". Baghdad Science Journal 18, n.º 2(Suppl.) (20 de junho de 2021): 0899. http://dx.doi.org/10.21123/bsj.2021.18.2(suppl.).0899.
Texto completo da fontePartala, Juha. "Algebraic generalization of Diffie–Hellman key exchange". Journal of Mathematical Cryptology 12, n.º 1 (1 de março de 2018): 1–21. http://dx.doi.org/10.1515/jmc-2017-0015.
Texto completo da fonteÁlvarez, Rafael, Alicia Andrade e Antonio Zamora. "Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption". Symmetry 10, n.º 12 (3 de dezembro de 2018): 705. http://dx.doi.org/10.3390/sym10120705.
Texto completo da fonteAlzahrani, Bander A., Ahmed Barnawi e Shehzad Ashraf Chaudhry. "A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems". Security and Communication Networks 2021 (5 de novembro de 2021): 1–12. http://dx.doi.org/10.1155/2021/3437373.
Texto completo da fonteBulbul, Salim Sabah, Zaid Ameen Abduljabbar, Duaa Fadhel Najem, Vincent Omollo Nyangaresi, Junchao Ma e Abdulla J. Y. Aldarwish. "Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control". Journal of Sensor and Actuator Networks 13, n.º 1 (2 de fevereiro de 2024): 12. http://dx.doi.org/10.3390/jsan13010012.
Texto completo da fontekumar, N. Shantha, e Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks". International Journal of Soft Computing and Engineering 9, n.º 4 (5 de novembro de 2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Texto completo da fonteLudyawati, Ludyawati, Muhammad Khudzaifah e Erna Herawati. "Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia". Jurnal Riset Mahasiswa Matematika 2, n.º 6 (1 de setembro de 2023): 247–56. http://dx.doi.org/10.18860/jrmm.v2i6.22041.
Texto completo da fonteHuang, Jing Lian, Zhuo Wang e Mei Rong He. "Algebraic Immunity, Correlation Immunity and other Cryptographic Properties of Quadratic Rotation Symmetric Boolean Functions". Advanced Materials Research 989-994 (julho de 2014): 2593–98. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2593.
Texto completo da fonteUeno, Rei, Naofumi Homma, Akiko Inoue e Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 1 (4 de dezembro de 2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Texto completo da fonteNawaz, Yasir, e Lei Wang. "Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation". Symmetry 11, n.º 12 (5 de dezembro de 2019): 1485. http://dx.doi.org/10.3390/sym11121485.
Texto completo da fonteVizár, Damian. "The State of the Authenticated Encryption". Tatra Mountains Mathematical Publications 67, n.º 1 (1 de setembro de 2016): 167–90. http://dx.doi.org/10.1515/tmmp-2016-0038.
Texto completo da fonteJang, Kyoungbae, Seungju Choi, Hyeokdong Kwon, Hyunji Kim, Jaehoon Park e Hwajeong Seo. "Grover on Korean Block Ciphers". Applied Sciences 10, n.º 18 (14 de setembro de 2020): 6407. http://dx.doi.org/10.3390/app10186407.
Texto completo da fonteGe, Xuyang, Tim Li, Yuqing Wang e Melinda S. Peng. "Tropical Cyclone Energy Dispersion in a Three-Dimensional Primitive Equation Model: Upper-Tropospheric Influence*". Journal of the Atmospheric Sciences 65, n.º 7 (1 de julho de 2008): 2272–89. http://dx.doi.org/10.1175/2007jas2431.1.
Texto completo da fonteRoeser, T., S. Stein e M. Kessel. "Nuclear beta-catenin and the development of bilateral symmetry in normal and LiCl-exposed chick embryos". Development 126, n.º 13 (1 de julho de 1999): 2955–65. http://dx.doi.org/10.1242/dev.126.13.2955.
Texto completo da fonteBoura, Christina, Patrick Derbez e Margot Funk. "Related-Key Differential Analysis of the AES". IACR Transactions on Symmetric Cryptology 2023, n.º 4 (8 de dezembro de 2023): 215–43. http://dx.doi.org/10.46586/tosc.v2023.i4.215-243.
Texto completo da fonteLee, Byoungcheon. "Stateless Re-Association in WPA3 Using Paired Token". Electronics 10, n.º 2 (19 de janeiro de 2021): 215. http://dx.doi.org/10.3390/electronics10020215.
Texto completo da fonteMiraj, Muhammad Armaghan Faisal, Naveed Ahsan, Hamza Tariq, Shan Shahzad e Rana Faizan Saleem. "Fracture Pattern Analysis of the Upper Cretaceous-Eocene Carbonates along with the Ghumawan Dome, Hazara Basin". International Journal of Economic and Environmental Geology 12, n.º 3 (16 de novembro de 2021): 6–10. http://dx.doi.org/10.46660/ijeeg.vol12.iss3.2021.612.
Texto completo da fonteHuang, Haiping, Qinglong Huang, Fu Xiao, Wenming Wang, Qi Li e Ting Dai. "An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains". Security and Communication Networks 2020 (1 de setembro de 2020): 1–17. http://dx.doi.org/10.1155/2020/8897282.
Texto completo da fonteMiraj, Muhammad Armaghan Faisal, Naveed Ahsan, Hamza Tariq, Shan Shahzad e Rana Faizan Saleem. "Fracture Pattern Analysis of the Upper Cretaceous-Eocene Carbonates along with the Ghumawan Dome, Hazara Basin". International Journal of Economic and Environmental Geology 12, n.º 3 (11 de março de 2023): 6–10. http://dx.doi.org/10.46660/ijeeg.v12i3.55.
Texto completo da fonteSelby, John H., Carlo Maria Scandolo e Bob Coecke. "Reconstructing quantum theory from diagrammatic postulates". Quantum 5 (28 de abril de 2021): 445. http://dx.doi.org/10.22331/q-2021-04-28-445.
Texto completo da fonteCao, Jing, Zuowei Wang e Alexei Likhtman. "Determining Tube Theory Parameters by Slip-Spring Model Simulations of Entangled Star Polymers in Fixed Networks". Polymers 11, n.º 3 (14 de março de 2019): 496. http://dx.doi.org/10.3390/polym11030496.
Texto completo da fonteSakan, Kairat, Saule Nyssanbayeva, Nursulu Kapalova, Kunbolat Algazy, Ardabek Khompysh e Dilmukhanbet Dyusenbayev. "Development and analysis of the new hashing algorithm based on block cipher". Eastern-European Journal of Enterprise Technologies 2, n.º 9 (116) (30 de abril de 2022): 60–73. http://dx.doi.org/10.15587/1729-4061.2022.252060.
Texto completo da fonteZaverucha, Gregory M., e Douglas R. Stinson. "Anonymity in shared symmetric key primitives". Designs, Codes and Cryptography 57, n.º 2 (20 de janeiro de 2010): 139–60. http://dx.doi.org/10.1007/s10623-009-9357-0.
Texto completo da fonteDatta, Nilanjan, Shreya Dey, Avijit Dutta e Sougata Mandal. "Cascading Four Round LRW1 is Beyond Birthday Bound Secure". IACR Transactions on Symmetric Cryptology 2023, n.º 4 (8 de dezembro de 2023): 365–90. http://dx.doi.org/10.46586/tosc.v2023.i4.365-390.
Texto completo da fonteRuf, Armin, Tim Tetaz, Brigitte Schott, Catherine Joseph e Markus G. Rudolph. "Quadruple space-group ambiguity owing to rotational and translational noncrystallographic symmetry in human liver fructose-1,6-bisphosphatase". Acta Crystallographica Section D Structural Biology 72, n.º 11 (28 de outubro de 2016): 1212–24. http://dx.doi.org/10.1107/s2059798316016715.
Texto completo da fonteLiu, Fukang, Abul Kalam, Santanu Sarkar e Willi Meier. "Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions". IACR Transactions on Symmetric Cryptology 2024, n.º 1 (1 de março de 2024): 214–33. http://dx.doi.org/10.46586/tosc.v2024.i1.214-233.
Texto completo da fonteAbbas, Ghulam, Muhammad Tanveer, Ziaul Haq Abbas, Muhammad Waqas, Thar Baker e Dhiya Al-Jumeily OBE. "A secure remote user authentication scheme for 6LoWPAN-based Internet of Things". PLOS ONE 16, n.º 11 (8 de novembro de 2021): e0258279. http://dx.doi.org/10.1371/journal.pone.0258279.
Texto completo da fonteAn, Yang, Yuejiao Zhang, Wenjun Cao, Zhiyan Tong e Zhangqing He. "A Lightweight and Practical Anonymous Authentication Protocol Based on Bit-Self-Test PUF". Electronics 11, n.º 5 (2 de março de 2022): 772. http://dx.doi.org/10.3390/electronics11050772.
Texto completo da fonteSantoli, Thomas, e Christian Schaffner. "Using Simon's algorithm to attack symmetric-key cryptographic primitives". Quantum Information and Computation 17, n.º 1&2 (janeiro de 2017): 65–78. http://dx.doi.org/10.26421/qic17.1-2-4.
Texto completo da fonteAli, Asim, Muhammad Asif Khan, Ramesh Kumar Ayyasamy e Muhammad Wasif. "A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map". PeerJ Computer Science 8 (11 de maio de 2022): e940. http://dx.doi.org/10.7717/peerj-cs.940.
Texto completo da fonteChakraborti, Avik, Nilanjan Datta e Mridul Nandi. "On the optimality of non-linear computations for symmetric key primitives". Journal of Mathematical Cryptology 12, n.º 4 (1 de dezembro de 2018): 241–59. http://dx.doi.org/10.1515/jmc-2017-0011.
Texto completo da fonteJin, Xin, Yuwei Duan, Ying Zhang, Yating Huang, Mengdong Li, Ming Mao, Amit Kumar Singh e Yujie Li. "Fast Search of Lightweight Block Cipher Primitives via Swarm-like Metaheuristics for Cyber Security". ACM Transactions on Internet Technology 21, n.º 4 (16 de julho de 2021): 1–15. http://dx.doi.org/10.1145/3417296.
Texto completo da fonteHussien, Hassan Mansur, Sharifah Md Yasin, Nur Izura Udzir e Mohd Izuan Hafez Ninggal. "Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage". Sensors 21, n.º 7 (2 de abril de 2021): 2462. http://dx.doi.org/10.3390/s21072462.
Texto completo da fonteChalla, Ratnakumari, e VijayaKumari Gunta. "Towards the Construction of Reed-Muller Code Based Symmetric Key FHE". Ingénierie des systèmes d information 26, n.º 6 (27 de dezembro de 2021): 585–90. http://dx.doi.org/10.18280/isi.260609.
Texto completo da fonteGoel, Aarushi, Matthew Green, Mathias Hall-Andersen e Gabriel Kaptchuk. "Efficient Set Membership Proofs using MPC-in-the-Head". Proceedings on Privacy Enhancing Technologies 2022, n.º 2 (3 de março de 2022): 304–24. http://dx.doi.org/10.2478/popets-2022-0047.
Texto completo da fonteParmar, Keyur, e Devesh C. Jinwala. "Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks". Journal of Information Security 06, n.º 01 (2015): 38–50. http://dx.doi.org/10.4236/jis.2015.61005.
Texto completo da fonteKaidalov, Dmytro, Roman Oliynykov e Oleksandr Kazymyrov. "A Method for Security Estimation of the Spn-Based Block Cipher Against Related-Key Attacks". Tatra Mountains Mathematical Publications 60, n.º 1 (1 de setembro de 2014): 25–45. http://dx.doi.org/10.2478/tmmp-2014-0023.
Texto completo da fonteNyangaresi, Vincent Omollo, Zaid Ameen Abduljabbar, Keyan Abdul-Aziz Mutlaq, Junchao Ma, Dhafer G. Honi, Abdulla J. Y. Aldarwish e Iman Qays Abduljaleel. "Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes". Applied Sciences 12, n.º 24 (11 de dezembro de 2022): 12688. http://dx.doi.org/10.3390/app122412688.
Texto completo da fonteBanegas, Gustavo, Paulo S. L. M. Barreto, Edoardo Persichetti e Paolo Santini. "Designing Efficient Dyadic Operations for Cryptographic Applications". Journal of Mathematical Cryptology 14, n.º 1 (19 de junho de 2020): 95–109. http://dx.doi.org/10.1515/jmc-2015-0054.
Texto completo da fonteXiao, Yao, Lei Xu, Zikang Chen, Can Zhang e Liehuang Zhu. "A Blockchain-Based Data Sharing System with Enhanced Auditability". Mathematics 10, n.º 23 (28 de novembro de 2022): 4494. http://dx.doi.org/10.3390/math10234494.
Texto completo da fonteLiu, Fukang, Mohammad Mahzoun, Morten Øygarden e Willi Meier. "Algebraic Attacks on RAIN and AIM Using Equivalent Representations". IACR Transactions on Symmetric Cryptology 2023, n.º 4 (8 de dezembro de 2023): 166–86. http://dx.doi.org/10.46586/tosc.v2023.i4.166-186.
Texto completo da fonteTomecek, Jozef. "Hardware optimizations of stream cipher rabbit". Tatra Mountains Mathematical Publications 50, n.º 1 (1 de dezembro de 2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Texto completo da fonteTeh, Tat-How, Chunchun Liu, Julian Wright e Junjie Zhou. "Multihoming and Oligopolistic Platform Competition". American Economic Journal: Microeconomics 15, n.º 4 (1 de novembro de 2023): 68–113. http://dx.doi.org/10.1257/mic.20210324.
Texto completo da fonteMansoor, Khwaja, Anwar Ghani, Shehzad Chaudhry, Shahaboddin Shamshirband, Shahbaz Ghayyur e Amir Mosavi. "Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography". Sensors 19, n.º 21 (1 de novembro de 2019): 4752. http://dx.doi.org/10.3390/s19214752.
Texto completo da fonteKuznetsov, О. О., Yu I. Горбенко, М. О. Poluyanenko, S. O. Kandiy e E. D. Matveeva. "Properties of the cost function in the iterative algorithm for generating nonlinear substitution". Radiotekhnika, n.º 209 (24 de junho de 2022): 16–28. http://dx.doi.org/10.30837/rt.2022.2.209.02.
Texto completo da fontePonomar, Volodymyr, e Viktor Onoprienko. "Analysis of the possibility of using modern packages of computer algebra in the synthesis of crypto-primitives". Physico-mathematical modelling and informational technologies, n.º 33 (4 de setembro de 2021): 128–32. http://dx.doi.org/10.15407/fmmit2021.33.128.
Texto completo da fonteLiu, Guoxiao, Keting Jia, Puwen Wei e Lei Ju. "High-Performance Hardware Implementation of MPCitH and Picnic3". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 2 (12 de março de 2024): 190–214. http://dx.doi.org/10.46586/tches.v2024.i2.190-214.
Texto completo da fonteXu, Wanshan, Jianbiao Zhang, Yilin Yuan, Xiao Wang, Yanhui Liu e Muhammad Irfan Khalid. "Towards efficient verifiable multi-keyword search over encrypted data based on blockchain". PeerJ Computer Science 8 (21 de março de 2022): e930. http://dx.doi.org/10.7717/peerj-cs.930.
Texto completo da fonte