Zobrazeno 1 - 10
of 149
pro vyhledávání: '"Cryptographic key types"'
Publikováno v:
Information Sciences. :1-11
As a special type of fault injection attacks, Related-Key Attacks (RKAs) allow an adversary to manipulate a cryptographic key and subsequently observe the outcomes of the cryptographic scheme under these modified keys. In the real life, related-key a
Publikováno v:
Indian Journal of Science and Technology. 10:1-8
Objectives: The public key cryptographic protocol is one of the most important fields in computer security. These new public key cryptographic protocols provide high security as compare to past results in the same field. Methods/Statistical Analysis:
Publikováno v:
Wireless Personal Communications. 95:1655-1675
According to the principles of quantum mechanics, quantum cryptography provides the necessary means to establish a secret and perfectly random key material between two parties. However, classical cryptography suffers from several vulnerabilities that
Autor:
Arcangelo Castiglione, Alfredo De Santis, Xinyi Huang, Barbara Masucci, Aniello Castiglione, Francesco Palmieri
Publikováno v:
IEEE Transactions on Information Forensics and Security. 11:2349-2364
A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the private information of a higher class can be used to derive the keys
Publikováno v:
International Journal of Research in Engineering and Technology. :66-70
Key Management in symmetric cryptography is to securely share a secret key between the two communicating individuals. The popular solution to this key management issue is to use public key cryptography schemes. The key management techniques are broad
Publikováno v:
Circuits and Systems. :3204-3211
As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various fields of military and commercial areas. In order to attain security on the data exchanged over the network, a hybrid crypto
Publikováno v:
Procedia Computer Science. 85:222-227
With the growth in technology, there is always a need of good encryption method which may provide better security and authenticity with lesser computational complexities. Although there are a lot of symmetric key algorithms which are already been pro
Autor:
Yashaswini J
Publikováno v:
International Journal of Innovative Research in Computer and Communication Engineering. :4327-4331
In today’s digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspec
Autor:
Patrick Schaumont, Mostafa Taha
Publikováno v:
IEEE Transactions on Information Forensics and Security. 10:519-528
Side-channel analysis (SCA) exploits the information leaked through unintentional outputs (e.g., power consumption) to reveal the secret key of cryptographic modules. The real threat of SCA lies in the ability to mount attacks over small parts of the
Publikováno v:
Procedia Computer Science. 57:1228-1234
With the crucial growth of technology, data security over the network and internet has achieved immense of prominence today and achieving good security is always a talk of a good security method being in place. Therefore, there is need of better secu