The IoT technology is currently used in many areas and marked by growing popularity. On the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in terms of security and privacy protection. An IoT infrastructure is characterized by a high level of threats due to, inter alia, numerous technical barriers that make it difficult to use conventional methods to protect information. The aim of this paper is to present a symmetric coding algorithm based on algebraic groups generated by specific trigonometric curves. The algorithm is dedicated to short data sequences transmitted by devices with limited computing power
In the past years, the Internet of Things (IoT) used in different applications and very wide range o...
Cryptosystem using linear codes was developed in 1978 by Mc-Eliece. Later in 1985 Niederreiter and o...
In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigenère symm...
The Internet of Things (IoT) being a promising innovation of things to come and is required to assoc...
When observing the modern world, we can see the dynamic development of new technologies, among which...
Cryptography technology is a security technique used to change plain text to another shape of data o...
Cryptography technology is a security technique used to change plain text to another shape of data o...
Data compression combined with effective encryption is a common requirement of data storage and tran...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Communication is the process of transmitting data across channel. Whenever data is transmitted acros...
Data compression combined with effective encryption is a common requirement of data storage and tran...
Data compression combined with effective encryption is a common requirement of data storage and tran...
Data compression combined with effective encryption is a common requirement of data storage and tran...
technological developments have placed the information into such a precious asset. Especially if it ...
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a ...
In the past years, the Internet of Things (IoT) used in different applications and very wide range o...
Cryptosystem using linear codes was developed in 1978 by Mc-Eliece. Later in 1985 Niederreiter and o...
In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigenère symm...
The Internet of Things (IoT) being a promising innovation of things to come and is required to assoc...
When observing the modern world, we can see the dynamic development of new technologies, among which...
Cryptography technology is a security technique used to change plain text to another shape of data o...
Cryptography technology is a security technique used to change plain text to another shape of data o...
Data compression combined with effective encryption is a common requirement of data storage and tran...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Communication is the process of transmitting data across channel. Whenever data is transmitted acros...
Data compression combined with effective encryption is a common requirement of data storage and tran...
Data compression combined with effective encryption is a common requirement of data storage and tran...
Data compression combined with effective encryption is a common requirement of data storage and tran...
technological developments have placed the information into such a precious asset. Especially if it ...
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a ...
In the past years, the Internet of Things (IoT) used in different applications and very wide range o...
Cryptosystem using linear codes was developed in 1978 by Mc-Eliece. Later in 1985 Niederreiter and o...
In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigenère symm...