Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling
暂无分享,去创建一个
[1] John Mark Espalmado,et al. DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques , 2017 .
[2] Yunfei Li,et al. Parallel Analysis of an Improved RSA Algorithm , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[3] Namita Tiwari,et al. EFFECTIVE IMPLEMENTATION AND AVALANCHE EFFECT OF AES , 2012 .
[4] Abdallah Karakra,et al. A-RSA: Augmented RSA , 2016, 2016 SAI Computing Conference (SAI).
[5] Suryadi Mt,et al. Performance of Chaos-Based Encryption Algorithm for Digital Image , 2014 .
[6] Edwin R. Arboleda,et al. Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems , 2017 .
[7] M. Mani Roja,et al. Dual-Layer Video Encryption using RSA Algorithm , 2015, ArXiv.
[8] Akash Kumar Mandal,et al. Analysis of Avalanche Effect in Plaintext of DES using Binary Codes , 2012 .
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Ye Qian,et al. The Analysis and Application on a Fractional-Order Chaotic System , 2014 .
[11] P. Indumathi,et al. Secure Optical Communication Using Chaos , 2011 .
[12] Sanjay Silakari,et al. Secure and Fast Chaos based Encryption System using Digital Logic Circuit , 2014 .
[13] Prashant Sharma,et al. RSA algorithm using modified subset sum cryptosystem , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[14] Jassim Mohammed Ahmed,et al. The enhancement of computation technique by combining RSA and El-Gamal Cryptosystems , 2011, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics.
[15] Man Young Rhee,et al. Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .
[17] K. Thamizhchelvy,et al. Data Hiding Technique with Fractal Image Generation Method using Chaos Theory and Watermarking , 2014 .
[18] Gurpreet Singh,et al. A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.
[19] Yuming Guo,et al. Research on Chaotic Firefly Algorithm and the Application in Optimal Reactive Power Dispatch , 2017 .
[20] Nentawe Y. Goshwe,et al. Data Encryption and Decryption Using RSA Algorithm in a Network Environment , 2013 .
[21] Alaa Hussein Al-Hamami,et al. Enhanced Method for RSA Cryptosystem Algorithm , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[22] Mohd. Shafry,et al. Chaos image encryption methods: a survey study , 2017 .
[23] Amin Ramezani,et al. Illustrate the Butterfly Effect on the Chaos Rikitake system , 2014 .
[24] Shikha Kuchhal. Security Design of TDES Using Low Power VLSI Implementation , 2013 .
[25] Bhavana Agrawal,et al. Implementation of AES and RSA Using Chaos System , 2013 .
[26] Karthik,et al. Hybrid cryptographic technique using OTP:RSA , 2017, 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS).