Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems
暂无分享,去创建一个
[1] Bhanu Prakash Lohani,et al. International Journal of Advanced Research in Computer Science and Electronics Engineering , 2012 .
[2] Igor N. Kovalenko,et al. Asymmetric Cryptographic Algorithms , 2003 .
[3] Man Young Rhee,et al. Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .
[4] Pooja,et al. Enhancing Cryptographic Security using Novel Approach based on Enhanced-RSA and Elamal: Analysis and Comparison , 2015 .
[5] Ayushi. A Symmetric Key Cryptographic Algorithm , 2010 .
[6] Rafael Timóteo de Sousa Júnior,et al. IDENTIFYING BANK FRAUDS USING CRISP -DM AND DECISION TREES , 2010 .
[7] Sanjay Silakari,et al. Secure and Fast Chaos based Encryption System using Digital Logic Circuit , 2014 .
[8] Jacques Stern,et al. RSA-OAEP Is Secure under the RSA Assumption , 2001, Journal of Cryptology.
[9] K Sunitha. Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm , 2013 .
[10] V. Krishnan. Study of Symmetric key Cryptography Algorithms , 2015 .
[11] Hayder Raheem Hashim,et al. Image Encryption and Decryption in A Modification of ElGamal Cryptosystem in MATLAB , 2014, ArXiv.
[12] Nivedita Bisht,et al. Evaluating the Behavior of AluminumCorrosion in Hydrochloric Acid in thePresence Aqueous Extract of Olive Seeds , 2015 .
[13] Mini Malhotra,et al. A New Encryption Scheme Based on Enhanced RSA and ElGamal , 2014 .
[14] Sangeeta Solanki,et al. Encryption and Decryption Algorithm using ASCII values with substitution array Approach , 2013 .
[15] Parsi Kalpana,et al. Data Security in Cloud Computing using RSA Algorithm , 2012 .
[16] Pawan Kumar,et al. Domain Specific Named Entity Recognition (DSNER) from Web Documents , 2014 .
[17] Tao Feng,et al. Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design , 2012, SOCO 2012.
[18] Adnan A. Hnaif,et al. E-VOTING PROTOCOL BASED ON PUBLIC -KEY CRYPTOGRAPHY , 2011 .
[19] K.L.S. Sharma. Data Communication and Networking , 2017 .
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] Ljupco Kocarev,et al. Theory and practice of chaotic cryptography , 2007 .
[22] Yashpalsingh Rajput,et al. An Improved Cryptographic Technique to Encrypt Text using Double Encryption , 2014 .
[23] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .