Optimization of The Gronsfeld Cipher Key Using Okamoto-Uchiyama Public-Key Cryptosystem for Data Security
暂无分享,去创建一个
[1] Giorgio Di Natale,et al. A New Secure Stream Cipher for Scan Chain Encryption , 2018, 2018 IEEE 3rd International Verification and Security Workshop (IVSW).
[2] Rahul Johari,et al. C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques , 2018, 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN).
[3] Ratih Puspasari,et al. Improve Security Algorithm Cryptography Vigenere Cipher Using Chaos Functions , 2018, 2018 6th International Conference on Cyber and IT Service Management (CITSM).
[4] Indra Gunawan,et al. Combination of Caesar Cipher Algorithm and Rivest Shamir Adleman Algorithm for Securing Document Files and Text Messages , 2019 .
[5] Dian Rachmawati,et al. Combination of columnar transposition cipher caesar cipher and lempel ziv welch algorithm in image security and compression , 2019, Journal of Physics: Conference Series.
[6] An Wang,et al. Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY , 2018, 2018 13th Asia Joint Conference on Information Security (AsiaJCIS).
[7] Bibhudendra Acharya,et al. Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem , 2010, Biometrics Technology.
[8] Sanjay Kumar,et al. Securing Data at rest using Hill Cipher and XOR based operations , 2018, 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA).