Enhanced Data Encryption Standard (DES) Algorithm based on Filtering and Striding Techniques
暂无分享,去创建一个
[1] Mukta Sharma,et al. DES: The oldest symmetric block key encryption algorithm , 2016, 2016 International Conference System Modeling & Advancement in Research Trends (SMART).
[2] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[3] Archana K. Rajan,et al. DES security enhancement with dynamic permutation , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
[4] Priyadarshini Patila,et al. A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .
[5] Rimpi Debnath,et al. DES, AES AND TRIPLE DES: SYMMETRIC KEY CRYPTOGRAPHY ALGORITHM , 2014 .
[6] Fatih Özkaynak,et al. Alternative substitutional box structures for DES , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).
[7] Qifu Tyler Sun,et al. A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense , 2018, IEEE Access.
[8] Sunita Prasad,et al. Security Enhancement in Data Encryption Standard , 2009, ICISTM.
[9] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[10] B. B. Zaidan,et al. New Comparative Study Between DES, 3DES and AES within Nine Factors , 2010, ArXiv.
[11] Yung-Cheol Byun,et al. Implementation of Improved DES Algorithm in Securing Smart Card Data , 2012, ICONS 2012.
[12] Pankaj Rohatgi,et al. Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.
[13] Luigi Lo Iacono. Understanding Cryptography , 2018, CCNA® Security Study Guide.
[14] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[15] Priyadarshini Patil,et al. A Comprehensive Evaluation of Cryptographic Algorithms , 2016 .
[16] Salwa Elramly,et al. DES algorithm security fortification using Elliptic Curve Cryptography , 2015, 2015 Tenth International Conference on Computer Engineering & Systems (ICCES).
[17] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[18] Shadi Aljawarneh,et al. Comprehensive study of symmetric key and asymmetric key encryption algorithms , 2017, 2017 International Conference on Engineering and Technology (ICET).
[19] Ali Chehab,et al. S-DES: An efficient & secure DES variant , 2018, 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM).