Results 301 to 310 of about 6,326,042 (362)
On the Security of 2-Key Triple DES [PDF]
This paper reconsiders the security offered by two-key triple DES, an encryption technique that remains widely used despite recently being de-standardised by NIST.
C. Mitchell
semanticscholar +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Neuro-Cryptanalysis of DES and Triple-DES
International Conference on Neural Information Processing, 2012In this paper, we apply a new cryptanalytic attack on DES and Triple-DES. The implemented attack is a known-plaintext attack based on neural networks. In this attack we trained a neural network to retrieve plaintext from ciphertext without retrieving the key used in encryption.
M. Alani
openaire +2 more sources
VLSI Implementation of Triple-DES Block Cipher
International Conference Computing Methodologies and Communication, 2023More sensitive information is being exchanged over computer networks as they grow. Securing information from unauthorized parties has emerged as a critical issue in the field of information technology security.
S. Subaselvi +4 more
semanticscholar +1 more source
Image Security Using Triple DES and DES Algorithms
2023 3rd Asian Conference on Innovation in Technology (ASIANCON), 2023Data is always the source of all information and must be more secured at all cost. Cryptography helps in preventing data from outer malicious attacks while it is transferred through the network.
S. Sakthipriya, R. Naresh
semanticscholar +1 more source
Image Encryption using Reverse Data Hiding Algorithm with Triple DES
International Congress on Information and Communication Technology, 2022Idea of the cryptography was utilized in this paper for communicating the information subtly and securely starting with the first client then onto the next as it shrouds the information behind picture.
Divya Vadlamudi +2 more
semanticscholar +1 more source

