Results 61 to 70 of about 5,884,412 (84)
Secured Communication using Data Dictionary through Triple DES
Shubham Kumar, S. Yadav, Deepa S. Kumar
semanticscholar +1 more source
Secure Message Transfer using Triple DES
Somya Garg, T. Garg, B. Mallick
semanticscholar +1 more source
Scan-based Attack against DES and Triple DES Cryptosystems Using Scan Signatures
Hirokazu Kodera +2 more
semanticscholar +1 more source
Optical Implementation of Triple DES Algorithm Based on Dual XOR Logic Operations
Seok-Hee Jeon, S. Gil
semanticscholar +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
VLSI Implementation of Triple-DES Block Cipher
International Conference Computing Methodologies and Communication, 2023More sensitive information is being exchanged over computer networks as they grow. Securing information from unauthorized parties has emerged as a critical issue in the field of information technology security.
S. Subaselvi +4 more
semanticscholar +1 more source
Image Encryption using Reverse Data Hiding Algorithm with Triple DES
International Congress on Information and Communication Technology, 2022Idea of the cryptography was utilized in this paper for communicating the information subtly and securely starting with the first client then onto the next as it shrouds the information behind picture.
Divya Vadlamudi +2 more
semanticscholar +1 more source

