Symmetric text encryption scheme based Karhunen Loeve transform

NFH Al-Saffar, IR Al-Saiq - Journal of Discrete Mathematical …, 2022 - Taylor & Francis
Recently cryptography is one of the essence areas of study. There are two types of
cryptography, this paper is concerned with the simplest and fastest which is “Symmetric Key …

Design of low-power random number generator using signal quantization error in smart grid

R Fujdiak, P Mlynek, J Misurec… - 2016 39th International …, 2016 - ieeexplore.ieee.org
The Smart Grid, as a current progressive new field, brings new possibilities and also new
challenges. This paper deals with cyber security challenges in Smart Grid area. We provide …

Application of Cryptography Based on Elliptic Curves

M Koppl, M Paulovic, M Orgon… - 2021 2nd …, 2021 - ieeexplore.ieee.org
ECC (Elliptic Curve Cryptography) is based on the algebraic structure of elliptic curves over
finite fields that allows the use of smaller encryption keys compared to other cryptographies …

Experimental autonomous car model with safety sensor in wireless network

F Valocky, M Orgon, I Fujdiak - IFAC-PapersOnLine, 2019 - Elsevier
Autonomous vehicles are vehicles equipped with autonomous control systems that allow
certain aspects of the control functions important for safe traffic to be controlled by the …

XBee technology: Complex evaluation of radio parameters

M Orgon, L Zagajec, I Schmidt - 2019 11th International …, 2019 - ieeexplore.ieee.org
This article focuses on testing XBee technology for maximum distance and packet loss in an
XBee-based wireless communications network. The paper presents the results of several …

Performance Comparison of ECDH and ECDSA

M Koppl, D Siroshtan, M Orgon… - 2021 2nd …, 2021 - ieeexplore.ieee.org
Elliptic curve cryptography is the current standard for public key cryptography and it is also
promoted by the National Institute of Standards and Technology (NIST) as the best way to …

[PDF][PDF] Elliptic curve and pseudo-inverse matrix based cryptosystem for wireless sensor networks

S Deb, MM Haque - International Journal of Electrical and Computer …, 2019 - academia.edu
Applying asymmetric key security to wireless sensor network (WSN) has been challenging
task for the researcher of this field. One common trade-off is that asymmetric key architecture …

Design and Implementation of Multilayer Encryption for Audio File Security

LK Patil, KA Popat - International Conference on Advancements in Smart …, 2023 - Springer
Using audio encryption, secure information can be transmitted. By doing this, Sender and
Receiver audio security is guaranteed. The security of delivering private audio data is crucial …

Common noise sources and their impact on OFDM highspeed HomePlug PLC networks

R Duriga, M Koppl, S Pocarovsky… - 2020 12th International …, 2020 - ieeexplore.ieee.org
This article covers the testing of PLC (Power Line Communication) network traffic by TCP
(Transmission Control Protocol) and UDP (User Datagram Protocol) protocols on aluminum …

Penetration Testing of WiFi Networks Secured by WEP and WPA/WPA2 Protocols

HB Duc, S Pocarovsky, M Orgon, M Koppl - Informatics and Cybernetics in …, 2021 - Springer
This article is focusing on wireless networks. The main purpose of this article is to do the
penetration testing of the wireless network that are using WEP (Wired Equivalent Privacy) or …