Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   5  
      CryptographyEncryptionCryptanalysisText
    • by 
    •   12  
      Computer ScienceInformation SecurityAlgorithmLinear Algebra
    • by 
    •   8  
      Computer ScienceNetwork SecurityCryptographyComputer Applications
With the spread of digital data around the world through the internet, the security of the data has raised a concern to the people. Many methods are coming up to protect the data from going into the hands of the unauthorized person.... more
    • by 
    •   6  
      CryptographyEncryptionSteganographyDecryption
    • by 
    •   6  
      Computer ScienceSecurityCryptographyEncryption
With the spread of digital data around the world through the internet, the security of the data has raised a concern to the people. Many methods are coming up to protect the data from going into the hands of the unauthorized person.... more
    • by 
    •   6  
      CryptographyEncryptionSteganographyDecryption
    • by  and +1
    •   3  
      Cloud Computing SecurityHomomorphic EncryptionPlaintext
Secured Communication involves Encryption process at the sending end and Decryption process at the receiving end of the communication system. Many Ciphers have been developed to provide data security . The efficiency of the Ciphers that... more
    • by 
    •   7  
      EncryptionDecryptionSubstitutionPrimitive Roots
The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced... more
    • by 
    •   5  
      Computer ScienceEncryptionDecryptionPlaintext
    • by  and +3
    •   4  
      CryptographyPrivate-Key EncryptionPlaintextIrecos
    • by  and +1
    •   20  
      FPGAComputer HardwareCryptographyField-Programmable Gate Arrays
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network Simulator 2 (NS-2) in terms of energy... more
    • by 
    •   13  
      Computer EngineeringWireless CommunicationsNetwork SecurityComputer Networks
Information security is an important issue. Hill Cipher is one of the most famous symmetric cryptosystem that can be used to protect information from unauthorized access.Hill cipher is a polygraph substitution cipher based on linear... more
    • by 
    •   7  
      Computer ScienceLinear AlgebraMatrix MultiplicationVery high throughput
The security concerns would be still there in cloud systems. Cryptography consists of the encryption-decryption techniques. There are many schemes, algorithms those can be used for security purposes. DNA is now mostly a theoretical... more
    • by 
    •   11  
      Genetic AlgorithmsEncryptionCloud ComputingGenetic Algorithm
    • by 
    •   5  
      Computer ScienceStateASCIIPlaintext
In this work we show the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms (PTFTs). The weakness that we are trying to show is the possibility of retrieving the “plaintext” image without using its... more
    • by 
    •   10  
      Image ProcessingCryptographyEncryptionOptical Imaging