Results 241 to 250 of about 39,218 (293)

Fast Registration Algorithm for Laser Point Cloud Based on 3D-SIFT Features. [PDF]

open access: yesSensors (Basel)
Yang L   +8 more
europepmc   +1 more source

Symmetric Key Algorithm in Computer security: A Review [PDF]

open access: possible2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2020
The primary objective of any computer security algorithm is that the untrusted third party should not be able to read or gain knowledge about the data being communicated or stored in different internet applications or storage platforms. One of the most prevalent fiestel network block cipher is Blowfish, which is capable to safeguard the protected data ...
R Anusha   +3 more
openaire   +1 more source

A New Symmetric Key Cryptography Algorithm Using Extended MSA Method: DJSA Symmetric Key Algorithm

2011 International Conference on Communication Systems and Network Technologies, 2011
In the present work the authors introduced a new symmetric key cryptographic method for encryption as well as decryption of any file such as binary file, text file or any other file. Nath et. al. (1) developed an algorithm called MSA for encryption and decryption of any file using a random key square matrix containing 256 elements.
Joyshree Nath   +3 more
openaire   +2 more sources

Performance Analysis of Symmetric Key Cryptographic Algorithms

2018 International Conference on Communication and Signal Processing (ICCSP), 2018
Data's security being important aspect of the today's internet is gaining more importance day by day. With the increase in online data exchange, transactions and payments; secure payment and secure data transfers have become an area of concern.
Shivaraj Kengond   +1 more
openaire   +2 more sources

A New Symmetric Key Quantum Cryptographic Algorithm

2007 National Radio Science Conference, 2007
Based on the principles of both classical and quantum computation primitives, a new symmetric key quantum cryptographic algorithm is proposed. This algorithm can be used to encrypt classical binary messages as well as quantum information. Encryption and decryption are implemented by the aid of classical and quantum computation which can be realized by ...
Hassan M. Elkamchochi   +2 more
openaire   +2 more sources

New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm

2011 International Conference on Communication Systems and Network Technologies, 2011
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods[1,2,3,4] where they have used some randomized key matrix for encryption and decryption
Joel James   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy