Zobrazeno 1 - 10
of 552
pro vyhledávání: '"Two-square cipher"'
Autor:
P. Kumaresan, Krupal Jaysukhbhai Kathrotia, Pushpam Virenbhai Patel, Chiranji Lal Chowdhary, Muhammad Attique, Muhammad Fazal Ijaz
Publikováno v:
Sensors (Basel, Switzerland)
Sensors, Vol 20, Iss 5162, p 5162 (2020)
Sensors
Volume 20
Issue 18
Sensors, Vol 20, Iss 5162, p 5162 (2020)
Sensors
Volume 20
Issue 18
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encrypt
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 30, Iss 3, Pp 349-355 (2018)
Image encryption is rapidly increased recently by the increasing use of the internet and communication media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption techniques are the suitable methods to pro
Autor:
Shivanku Mahna, Pooja Prashar
Publikováno v:
International Journal of Computer Applications. 175:1-4
Autor:
Syed Haroon Hasan, Zuber Farooqui
Publikováno v:
International Journal of Computer Applications. 173:49-53
Publikováno v:
Cryptography and Communications. 10:177-193
On-line ciphers are convenient building blocks for realizing efficient single- pass encryption. In particular, the trend to limit the consequences of nonce reuses rendered them popular in recent authenticated encryption schemes. While encryption sche
Autor:
Howard M. Heys
Publikováno v:
The Computer Journal. 60:1839-1851
Autor:
Fahrul Ikhsan Lubis, Rahmat Widia Sembiring, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara
Publikováno v:
Advances in Science, Technology and Engineering Systems, Vol 2, Iss 5, Pp 22-25 (2017)
The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the
Publikováno v:
IET Information Security. 11:159-167
Binary decision diagram (BDD) is a state-of-the-art data structure for representing and manipulating Boolean functions. In 2002, Krause proposed theoretical framework for BDD-based cryptanalysis of stream ciphers. Since then not much work have been r
Autor:
Goutham L
Publikováno v:
International Journal for Research in Applied Science and Engineering Technology. :342-345
Publikováno v:
International Journal of Computer Network and Information Security. 9:29-36