Key management systems for large-scale quantum key distribution networks

P James, S Laschet, S Ramacher… - Proceedings of the 18th …, 2023 - dl.acm.org
The Key Management System (KMS) is an important component in scaling up from link-to-
link key generation to large key distribution networks. In this work we provide an overview of …

[PDF][PDF] Dynamic Key Cryptography and Applications.

HH Ngo, X Wu, PD Le, C Wilson, B Srinivasan - Int. J. Netw. Secur., 2010 - academia.edu
In modern security models, cryptography plays a fundamental role in protecting data integrity
and confidentiality in information systems. However, cryptography itself is subject to …

Ciphered BCH Codes for PAPR Reduction in the OFDM in Underwater Acoustic Channels

M Murad, IA Tasadduq, P Otero - Journal of Marine Science and …, 2022 - mdpi.com
We propose an effective, low complexity and multifaceted scheme for peak-to-average
power ratio (PAPR) reduction in the orthogonal frequency division multiplexing (OFDM) …

One-Time Pad as a nonlinear dynamical system

N Nagaraj - Communications in Nonlinear Science and Numerical …, 2012 - Elsevier
The One-Time Pad (OTP) is the only known unbreakable cipher, proved mathematically by
Shannon in 1949. In spite of several practical drawbacks of using the OTP, it continues to be …

XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era

LA Lizama-Pérez - Cryptography, 2023 - mdpi.com
In this article, we present a new method that achieves Shannon's perfect secrecy. To
achieve this property, we will introduce the triple XOR cancellation rule. The approach has …

Enhancement of website password security by using access log-based salt

J Jeong, D Woo, Y Cha - … on Systems of Collaboration Big Data …, 2019 - ieeexplore.ieee.org
According to privacy policy, the password of the website should be stored by one-way
encryption using a hash function to prevent decryption. National information security …

A reliable and secure data transmission in CEAACK MANETs using distinct dynamic key with classified digital signature cryptographic algorithm

J Sathiamoorthy, B Ramakrishnan… - … on Computing and …, 2015 - ieeexplore.ieee.org
CEAACK MANETs are vulnerable to attacks and this can be reduced by employing a cluster
mechanism which ensures that packet transmission occurs without unnecessary delay …

Assessment and performance improvement of multicarrier modulation for underwater acoustic communications

M Murad - 2022 - riuma.uma.es
Wireless underwater communication involves transmitting and receiving data below water
without a wired interface. Acoustic waves have been reliably used for underwater …

One time pad and the short key dream

U Cerruti - arXiv preprint arXiv:2108.06981, 2021 - arxiv.org
This is a survey on the One Time Pad (OTP) and its derivatives, from its origins to modern
times. OTP, if used correctly, is (the only) cryptographic code that no computing power …

An encryption approach to improve the security and performance of data by integrating AES with a modified OTP technique

S Gupta, S Jain, M Agarwal… - International Journal of …, 2024 - inderscienceonline.com
Maintaining the security and privacy of data is of paramount priority while using the network
and communication systems. Cryptography is an art used to solve the sole purpose of data …