• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 4,796
Next 10 →

Symmetric key authentication services revisited

by Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum - In ACISP 2004, volume 3108/2004 of LNCS , 2004
"... Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [17] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area n ..."
Abstract - Cited by 9 (3 self) - Add to MetaCart
Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [17] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

Symmetric Cryptosystems and Symmetric Key Management

by Brian A. Carter, Ari Kassin, Tanja Magoc , 2007
"... Since the earliest days of necessity for secret transmission of messages, which date back to thousands years BCE, different methods have been used to transfer the message between two parties. These days, ..."
Abstract - Add to MetaCart
Since the earliest days of necessity for secret transmission of messages, which date back to thousands years BCE, different methods have been used to transfer the message between two parties. These days,

Symmetric key Cryptography using modified DJSSA symmetric key algorithm

by Dripto Chatterjee, Joyshree Nath, Sankar Das, Shalabh Agarwal, Asoke
"... Abstract-The present work deals with modified advanced symmetric key cryptographic method i.e. modified DJSSA algorithm[1] for multiple encryption and decryption of any file. Recently Nath et al[1] developed an algorithm called DJSSA for encryption and decryption of any file using a random key matri ..."
Abstract - Add to MetaCart
Abstract-The present work deals with modified advanced symmetric key cryptographic method i.e. modified DJSSA algorithm[1] for multiple encryption and decryption of any file. Recently Nath et al[1] developed an algorithm called DJSSA for encryption and decryption of any file using a random key

Chaos-Based Symmetric Key Cryptosystems

by Christopher A. Wood
"... Abstract — Chaos theory is the study of dynamical systems that are highly sensitive to initial conditions and exhibit seemingly random behavior. From the perspective of cryptography and information security, randomness generated from entirely deterministic systems is a very appealing property. As su ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
. As such, the application of chaos in modern cryptography has been a topic of much research and debate for over a decade. This paper presents an overview of chaotic dynamics and their role in symmetric key chaos-based cryptosystems from both a theoretical and practical perspective. It is argued that chaos

Symmetric Key Authentication Using Verification in Public

by Jaap-henk Hoepman , 2001
"... Several protocols for authentication using memory-constrained smart cards or tokens based on symmetric key cryptography are described. ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Several protocols for authentication using memory-constrained smart cards or tokens based on symmetric key cryptography are described.

Reconfigurable Computing For Symmetric-Key Algorithms

by Adam J. Elbirt , 2002
"... ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
Abstract not found

Architectural Support for Fast Symmetric-Key Cryptography

by Jerome Burke, John Mcdonald, Todd Austin - in Proc. Intl. Conf. ASPLOS , 2000
"... The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides the mechanisms necessary to implement accountability, accuracy, and confidentiality in communication. As demands for secu ..."
Abstract - Cited by 58 (0 self) - Add to MetaCart
for secure communication bandwidth grow, efficient cryptographic processing will become increasingly vital to good system performance. In this paper, we explore techniques to improve the performance of symmetric key cipher algorithms. Eight popular strong encryption algorithms are examined in detail

Frame Based Symmetric Key Cryptography

by Uttam Kr. Mondal, Satyendra Nath Mandal, J. Palchoudhury
"... -----------------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------------------------There are huge numbers of algorithms available in symmetry key block cipher. All these algorithms have been used either complicated ..."
Abstract - Add to MetaCart
-----------------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------------------------There are huge numbers of algorithms available in symmetry key block cipher. All these algorithms have been used either complicated

Symmetric Key Cryptography: Technological Developments in the Field

by Md. Sarfaraz Iqbal, Shivendra Singh, Arunima Jaiswal
"... This paper presents the various developments and emerging trends in the symmetric key cryptography technique. It provides an overview of latest inventions and approaches that are implemented in the recent scenario for the betterment of private key cryptography technique with respect to its efficienc ..."
Abstract - Add to MetaCart
This paper presents the various developments and emerging trends in the symmetric key cryptography technique. It provides an overview of latest inventions and approaches that are implemented in the recent scenario for the betterment of private key cryptography technique with respect to its

AN IMAGE BASED KEY GENERATION FOR SYMMETRIC KEY CRYPTOGRPAHY

by G. Manik, S. Ramakrishnan, R. Rajaram, V. Venkattesh
"... Abstract: Information sharing through digital media is a vital and challenging one. Those challenges are addressed with the help of cryptographic and stenographic techniques. In general, strength of the symmetric key cryptographic algorithms is based on keys. The objective of this paper is to propos ..."
Abstract - Add to MetaCart
Abstract: Information sharing through digital media is a vital and challenging one. Those challenges are addressed with the help of cryptographic and stenographic techniques. In general, strength of the symmetric key cryptographic algorithms is based on keys. The objective of this paper
Next 10 →
Results 11 - 20 of 4,796
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University