17   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Agus Winarno and Riri Fitri Sari    
Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely use... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jin-Bo Wang, You Wu and Yu Zhou    
Maximum distance separable (MDS) codes have the maximum branch number in cryptography, and they are generally used in diffusion layers of symmetric ciphers. The diffusion layer of the Advanced Encryption Standard (AES) uses the circulant MDS matrix with ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hayder Najm,Haider K. Hoomod,Rehab Hassan     Pág. pp. 184 - 199
The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems... ver más

 
en línea
Yuichi Komano and Shoichi Hirose    
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness. It is on... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kiernan George and Alan J. Michaels    
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Syed Hamid Hasan, Mohamed Salim Trigui, Anser Ghazzaal Ali Alquraishee     Pág. 1424 - 1429
The process of protecting the accessibility,  reliability, and secrecy of information is called Information security. We see a great increase in accessing of computer databases for stored information. Increasing number of companies are storing indiv... ver más

 
en línea
Fadhillah Azmi,Winda Erika     Pág. 27 - 29
Komunikasi adalah proses dasar dari pertukaran informasi. Efektifitas komunikasikomputer secara umum adalah melalui internet atau beberapa saluran komunikasi lainnya.Tujuan utama tulisan ini adalah berdasarkan pada analisis hasil yang diberikan Weinermen... ver más

 
en línea
Khai-Minh Ma, Duc-Hung Le, Cong-Kha Pham and Trong-Thuc Hoang    
The security of Internet of Things (IoTs) devices in recent years has created interest in developing implementations of lightweight cryptographic algorithms for such systems. Additionally, open-source hardware and field-programable gate arrays (FPGAs) ar... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Evgenia Ishchukova, Ekaterina Maro and Pavel Pristalov    
In January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik. In this paper we propose to consider the possibility of applying the algebrai... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva and Dilmukhanbet Dyusenbayev    
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 algorit... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mohammed El-hajj, Hussien Mousawi and Ahmad Fadlallah    
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor netw... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Liliya Akhmetzyanova,Evgeny Alekseev,Alexandra Babueva,Andrey Bozhko,Stanislav Smyshlyaev     Pág. 6 - 14
We introduce a new AEAD mode ? an MGM2 mode. For this mode we provide security bounds regarding extended security notions in the nonce-misuse setting. Misuseresistance is crucial for applications for which there is no way to provide u... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Liliya Akhmetzyanova,Evgeny Alekseev,Alexandra Babueva,Andrey Bozhko,Stanislav Smyshlyaev     Pág. 6 - 14
We introduce a new AEAD mode ? an MGM2 mode. For this mode we provide security bounds regarding extended security notions in the nonce-misuse setting. Misuseresistance is crucial for applications for which there is no way to provide u... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Kazuki Nakamura, Koji Hori and Shoichi Hirose    
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nursulu Kapalova, Kairat Sakan, Kunbolat Algazy and Dilmukhanbet Dyusenbayev    
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides five-round encryption of 128-bit blocks, while the data size at the input and output of the S-box is 8 bits. The main transformation is the F transformat... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Liliya Akhmetzyanova     Pág. 1 - 9
In this paper the security of AEAD mode called the Multilinear Galois Mode (MGM) was analyzed regarding confidentiality property. This mode was originally proposed in CTCrypt 2017. Then it was adopted as a standard AEAD mode in the Ru... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Alla Gavrilova,Ihor Volkov,Yuliia Kozhedub,Roman Korolev,Oleksandr Lezik,Volodymyr Medvediev,Oleksandr Milov,Bogdan Tomashevsky,Andrii Trystan,Oksana Chekunova     Pág. 45 - 63
The development of computer technology has determined the vector for the expansion of services based on the Internet and ?G? technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, sec... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »