Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3143210
Abstract: The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT…
read more here.
Keywords:
key generation;
group;
symmetric key;
cryptography ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3192970
Abstract: Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed these algorithms…
read more here.
Keywords:
key;
energy costs;
energy;
encryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Symmetry"
DOI: 10.3390/sym12010073
Abstract: In this paper, an improved encryption algorithm based on numerical methods and rotation–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key. Symmetric key…
read more here.
Keywords:
key encryption;
rotation translation;
encryption;
symmetric key ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "Symmetry"
DOI: 10.3390/sym14081709
Abstract: An instance of the framework for cryptographic security enhancement of symmetric-key encryption employing a dedicated error correction encoding is addressed. The main components of the proposal are: (i) a dedicated error correction coding and (ii)…
read more here.
Keywords:
key encryption;
encryption;
security;
symmetric key ... See more keywords