Search Results

Results (3)

Search Parameters:

Keyword: Block Cipher
Order results
Results per page
Open AccessArticle
5 Pages, 778 KB Download PDF

Quantum Secure Lightweight Cryptography with Quantum Permutation Pad

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 401–405, 2021; DOI: 10.25046/aj060445
Abstract:

Quantum logic gates represent certain quantum operations to perform quantum computations. Of those quantum gates, there is a category of classical behavior gates called quantum permutation gates. As a quantum algorithm, quantum permutation pad or QPP consists of multiple quantum permutation gates to be implemented both in a quantum computing system as a quantum circuit…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 848 KB Download PDF

Node-Node Data Exchange in IoT Devices Using Twofish and DHE

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 622–628, 2021; DOI: 10.25046/aj060271
Abstract:

Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 368 KB Download PDF

An Encryption Key for Secure Authentication: The Dynamic Solution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 540–544, 2017; DOI: 10.25046/aj020369
Abstract:

In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026