Results 11 - 20
of
4,796
Symmetric key authentication services revisited
- In ACISP 2004, volume 3108/2004 of LNCS
, 2004
"... Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [17] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area n ..."
Abstract
-
Cited by 9 (3 self)
- Add to MetaCart
Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [17] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area
Symmetric Cryptosystems and Symmetric Key Management
, 2007
"... Since the earliest days of necessity for secret transmission of messages, which date back to thousands years BCE, different methods have been used to transfer the message between two parties. These days, ..."
Abstract
- Add to MetaCart
Since the earliest days of necessity for secret transmission of messages, which date back to thousands years BCE, different methods have been used to transfer the message between two parties. These days,
Symmetric key Cryptography using modified DJSSA symmetric key algorithm
"... Abstract-The present work deals with modified advanced symmetric key cryptographic method i.e. modified DJSSA algorithm[1] for multiple encryption and decryption of any file. Recently Nath et al[1] developed an algorithm called DJSSA for encryption and decryption of any file using a random key matri ..."
Abstract
- Add to MetaCart
Abstract-The present work deals with modified advanced symmetric key cryptographic method i.e. modified DJSSA algorithm[1] for multiple encryption and decryption of any file. Recently Nath et al[1] developed an algorithm called DJSSA for encryption and decryption of any file using a random key
Chaos-Based Symmetric Key Cryptosystems
"... Abstract — Chaos theory is the study of dynamical systems that are highly sensitive to initial conditions and exhibit seemingly random behavior. From the perspective of cryptography and information security, randomness generated from entirely deterministic systems is a very appealing property. As su ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
. As such, the application of chaos in modern cryptography has been a topic of much research and debate for over a decade. This paper presents an overview of chaotic dynamics and their role in symmetric key chaos-based cryptosystems from both a theoretical and practical perspective. It is argued that chaos
Symmetric Key Authentication Using Verification in Public
, 2001
"... Several protocols for authentication using memory-constrained smart cards or tokens based on symmetric key cryptography are described. ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Several protocols for authentication using memory-constrained smart cards or tokens based on symmetric key cryptography are described.
Architectural Support for Fast Symmetric-Key Cryptography
- in Proc. Intl. Conf. ASPLOS
, 2000
"... The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides the mechanisms necessary to implement accountability, accuracy, and confidentiality in communication. As demands for secu ..."
Abstract
-
Cited by 58 (0 self)
- Add to MetaCart
for secure communication bandwidth grow, efficient cryptographic processing will become increasingly vital to good system performance. In this paper, we explore techniques to improve the performance of symmetric key cipher algorithms. Eight popular strong encryption algorithms are examined in detail
Frame Based Symmetric Key Cryptography
"... -----------------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------------------------There are huge numbers of algorithms available in symmetry key block cipher. All these algorithms have been used either complicated ..."
Abstract
- Add to MetaCart
-----------------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------------------------There are huge numbers of algorithms available in symmetry key block cipher. All these algorithms have been used either complicated
Symmetric Key Cryptography: Technological Developments in the Field
"... This paper presents the various developments and emerging trends in the symmetric key cryptography technique. It provides an overview of latest inventions and approaches that are implemented in the recent scenario for the betterment of private key cryptography technique with respect to its efficienc ..."
Abstract
- Add to MetaCart
This paper presents the various developments and emerging trends in the symmetric key cryptography technique. It provides an overview of latest inventions and approaches that are implemented in the recent scenario for the betterment of private key cryptography technique with respect to its
AN IMAGE BASED KEY GENERATION FOR SYMMETRIC KEY CRYPTOGRPAHY
"... Abstract: Information sharing through digital media is a vital and challenging one. Those challenges are addressed with the help of cryptographic and stenographic techniques. In general, strength of the symmetric key cryptographic algorithms is based on keys. The objective of this paper is to propos ..."
Abstract
- Add to MetaCart
Abstract: Information sharing through digital media is a vital and challenging one. Those challenges are addressed with the help of cryptographic and stenographic techniques. In general, strength of the symmetric key cryptographic algorithms is based on keys. The objective of this paper
Results 11 - 20
of
4,796