Results 231 to 240 of about 383,874 (285)
Some of the next articles are maybe not open access.

Related searches:

A New Symmetric Key Cryptography Algorithm Using Extended MSA Method: DJSA Symmetric Key Algorithm

2011 International Conference on Communication Systems and Network Technologies, 2011
In the present work the authors introduced a new symmetric key cryptographic method for encryption as well as decryption of any file such as binary file, text file or any other file. Nath et. al. (1) developed an algorithm called MSA for encryption and decryption of any file using a random key square matrix containing 256 elements.
Dripto Chatterjee   +3 more
openaire   +1 more source

Symmetric Key Algorithm in Computer security: A Review

2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2020
The primary objective of any computer security algorithm is that the untrusted third party should not be able to read or gain knowledge about the data being communicated or stored in different internet applications or storage platforms. One of the most prevalent fiestel network block cipher is Blowfish, which is capable to safeguard the protected data ...
R Anusha   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy