Implementation of Secured Message Transmission using DES and RSA Cryptosystem
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[2] H. F. Gaines,et al. Cryptanalysis: A Study of Ciphers and Their Solution , 1956 .
[3] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[4] Mousa Farajallah,et al. Survey Paper: Cryptography Is The Science Of Information Security , 2011 .
[5] Vincenzo Morabito,et al. A Survey of Critical Success Factors in e-Banking , 2005 .
[6] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[7] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[8] S. Subasree,et al. DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS , 2010 .
[9] 곽병재,et al. Secure communication using error correction codes , 2010 .
[10] Asif Irshad Khan,et al. Secure Communication using Symmetric and Asymmetric Cryptographic Techniques , 2012 .
[11] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[12] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[13] V. N. Sastry,et al. Cluster based multihop security protocol in MANET using ECC , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.
[14] Paul Reid,et al. Biometrics for Network Security , 2003 .
[15] Donald W. Davies. Advances in cryptology--EUROCRYPT '91 : Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings , 1991 .
[16] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .