Results 241 to 250 of about 39,218 (293)
Construction of a Structurally Unbiased Brain Template with High Image Quality from MRI Scans of Saudi Adult Females. [PDF]
Althobaiti N +4 more
europepmc +1 more source
Enhancing IoT security in smart grids with quantum-resistant hybrid encryption. [PDF]
Xiong J, Shen L, Liu Y, Fang X.
europepmc +1 more source
Application of the metaheuristic algorithms to quantify the GSI based on the RMR classification. [PDF]
Davoodi PK, Hajizadeh F, Rezaei M.
europepmc +1 more source
Fast Registration Algorithm for Laser Point Cloud Based on 3D-SIFT Features. [PDF]
Yang L +8 more
europepmc +1 more source
Symmetric Key Algorithm in Computer security: A Review [PDF]
The primary objective of any computer security algorithm is that the untrusted third party should not be able to read or gain knowledge about the data being communicated or stored in different internet applications or storage platforms. One of the most prevalent fiestel network block cipher is Blowfish, which is capable to safeguard the protected data ...
R Anusha +3 more
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A New Symmetric Key Cryptography Algorithm Using Extended MSA Method: DJSA Symmetric Key Algorithm
2011 International Conference on Communication Systems and Network Technologies, 2011In the present work the authors introduced a new symmetric key cryptographic method for encryption as well as decryption of any file such as binary file, text file or any other file. Nath et. al. (1) developed an algorithm called MSA for encryption and decryption of any file using a random key square matrix containing 256 elements.
Joyshree Nath +3 more
openaire +2 more sources
Performance Analysis of Symmetric Key Cryptographic Algorithms
2018 International Conference on Communication and Signal Processing (ICCSP), 2018Data's security being important aspect of the today's internet is gaining more importance day by day. With the increase in online data exchange, transactions and payments; secure payment and secure data transfers have become an area of concern.
Shivaraj Kengond +1 more
openaire +2 more sources
A New Symmetric Key Quantum Cryptographic Algorithm
2007 National Radio Science Conference, 2007Based on the principles of both classical and quantum computation primitives, a new symmetric key quantum cryptographic algorithm is proposed. This algorithm can be used to encrypt classical binary messages as well as quantum information. Encryption and decryption are implemented by the aid of classical and quantum computation which can be realized by ...
Hassan M. Elkamchochi +2 more
openaire +2 more sources
2011 International Conference on Communication Systems and Network Technologies, 2011
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods[1,2,3,4] where they have used some randomized key matrix for encryption and decryption
Joel James +5 more
openaire +2 more sources
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods[1,2,3,4] where they have used some randomized key matrix for encryption and decryption
Joel James +5 more
openaire +2 more sources

