Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Surendra Kumar Nanda"'
The cryptographic hash functions are the most fundamental cryptographic concept. These functions are used as basic building blocks for digital signatures and message authentication. Boolean functions are the core of hash functions. These functions ar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a31e77834269bf179a2757bb489bd9cb
https://zenodo.org/record/7690595
https://zenodo.org/record/7690595
Autor:
Debendra Muduli, Rojalina Priyadarshini, Ram Chandra Barik, Surendra Kumar Nanda, Rabindra K. Barik, Diptendu Sinha Roy
Publikováno v:
2023 6th International Conference on Information Systems and Computer Networks (ISCON).
Autor:
Subham Divakar, Rojalina Priyadarshini, Surendra Kumar Nanda, Debendra Muduli, Ramchandra Barik
Publikováno v:
Proceedings in Adaptation, Learning and Optimization ISBN: 9783031311635
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::65adaf4a43ced50ed1684f4f7b694d92
https://doi.org/10.1007/978-3-031-31164-2_50
https://doi.org/10.1007/978-3-031-31164-2_50
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811694790
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::98fbfa69fc31e51c05716dadf3ec8548
https://doi.org/10.1007/978-981-16-9480-6_22
https://doi.org/10.1007/978-981-16-9480-6_22
Publikováno v:
Electronics; Volume 11; Issue 19; Pages: 3190
Reversible cellular automation is a highly parallel system and produces enhanced throughput in its cryptographic applications. The throughput optimized security algorithm based on reversible cellular automata produces a better result in high-performa
Publikováno v:
Machine Learning and Information Processing ISBN: 9789813348585
This paper focuses on designing a cryptographic algorithm which is based on a pair of reversible complement cellular automata rules that include a pair of reversible cellular automata rules, a random number, and a shared key. During decryption, the i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ad178dcbd6b79944482cc16d33c56be7
https://doi.org/10.1007/978-981-33-4859-2_46
https://doi.org/10.1007/978-981-33-4859-2_46
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811032257
Maximum real time solicitations require Quality of Service (QoS) during data communication. Therefore many routing protocols for Mobile Adhoc Network (MANET) associating Real Time Applications have been established that uses improved Real time struct
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6745a5ade9616d169228c8f7f11af64c
https://doi.org/10.1007/978-981-10-3226-4_14
https://doi.org/10.1007/978-981-10-3226-4_14
Publikováno v:
International Journal of Communication Networks and Security. :47-52
In this paper we present the equivalence of the operations involved in DES and AES algorithm with operations of cellular automata. We identify all the permutation and substitution operations involved in DES and AES algorithm and compare these operati
Publikováno v:
International Journal of Communication Networks and Security. :18-23
In this paper we present a new encryption and decryption algorithm for block cipher based on the linear (periodic boundary-PB) and nonlinear cellular automata rules. First we apply non linear CA rules (complements) to both plain text and key. Then PB