Filters








16,851 Hits in 2.8 sec

Cryptography with Streaming Algorithms [chapter]

Periklis A. Papakonstantinou, Guang Yang
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Given the Learning With Errors (LWE) assumption we construct PKE where both the encryption and decryption are streaming algorithms.  ...  In streaming cryptography (not to be confused with streamciphers) everything-the keys, the messages, and the seeds-are huge compared to the internal memory of the device.  ...  discussions on PKE decryption, to Yuval Ishai for the enlightening discussions on the PRG construction, to Frederic Magniez for thought-provoking discussions on the "folk wisdom" regarding the multi-stream  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44381-1_4">doi:10.1007/978-3-662-44381-1_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gtjuz4j56zhhtc4ejhv5xzuqjq">fatcat:gtjuz4j56zhhtc4ejhv5xzuqjq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190503070626/https://link.springer.com/content/pdf/10.1007%2F978-3-662-44381-1_4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/10/a3/10a381e311c6d7501dfcfd49f6bc9c58e067410d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44381-1_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Optical Bit-Plane-based 3D-JST Cryptography Algorithm with Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication

Walid El-Shafai, Iman Almomani, Aala Alkhayer
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
To validate the efficacy of the proposed cryptography algorithm for secure HEVC streaming, a comprehensive evaluation framework has been introduced and followed to (a) test HEVC streams against different  ...  The evaluation results show a secure and efficient proposed cryptography algorithm that outperforms the conventional and related cryptography algorithms in terms of all examined evaluation metrics.  ...  .: Optical Bit-Plane-Based 3D-JST Cryptography Algorithm With Cascaded 2D-FrFT Encryption FIGURE 8 . 8 The enciphered and deciphered HEVC streams in the state of Speckle noise with different variances  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3062403">doi:10.1109/access.2021.3062403</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xwae7aej65dafh5ejpplxof6le">fatcat:xwae7aej65dafh5ejpplxof6le</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210429100117/https://ieeexplore.ieee.org/ielx7/6287639/9312710/09363886.pdf?tp=&amp;arnumber=9363886&amp;isnumber=9312710&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/49/0d/490dfb57ce943fedfdf2ad3309dbc59587f4e727.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3062403"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

A New Method for Symmetric Key Cryptography

B. Nagaraju, P. Ramkumar
<span title="2016-05-17">2016</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
Encryption algorithms can be categorized into Symmetric key cryptography and Asymmetric key cryptography.  ...  This algorithm is not following the feistel structure, substitutions and permutations. This algorithm can be used for stream ciphers and block ciphers.  ...  To provide the secure communication between the communication parties, we are using Cryptography concept. Cryptography means "secret writing" [4] .It is the word with Greek origin.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016909888">doi:10.5120/ijca2016909888</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zlzypaon35cghnvozpumh6fklu">fatcat:zlzypaon35cghnvozpumh6fklu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602223339/https://www.ijcaonline.org/archives/volume142/number8/nagaraju-2016-ijca-909888.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/19/e9/19e972008cbc1406bf24e554f6b1fa5a42992e34.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016909888"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY

Sanket Shah, G.H.Patel Institute of Engineering And Technology,Anand,Gujarat,India
<span title="2018-10-20">2018</span> <i title="IJARCS International Journal of Advanced Research in Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dbwzqwxyw5hn3aantchmoxx65q" style="color: black;">International Journal of Advanced Research in Computer Science</a> </i> &nbsp;
Though there are two types of algorithm for encryption namely symmetric [1] and asymmetric [1], This pa concern with digital symmetric cryptography using image to replace some bits and at the receiver  ...  To preserve data integrity of the message sent over the internet vario cryptography is used.  ...  This two binary data streams are algorithm, which will v' binary elements.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26483/ijarcs.v9i5.6286">doi:10.26483/ijarcs.v9i5.6286</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f6nfmczte5doxoypkvccuiumsm">fatcat:f6nfmczte5doxoypkvccuiumsm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428101352/http://ijarcs.info/index.php/Ijarcs/article/download/6286/5108" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/44/62/446274d67391e89c24c56fd1eea9069ae84d1c35.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26483/ijarcs.v9i5.6286"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Symmetric Key Cryptographic Algorithm

Ms Ayushi
<span title="2010-02-25">2010</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
In modern times cryptography is considered a branch of both mathematics and computer science and is affiliated closely with information theory, computer security and engineering.  ...  This paper describes cryptography, various symmetric key algorithms in detail and then proposes a new symmetric key algorithm. Algorithms for both encryption and decryption are provided here.  ...  There are a number of other secret-key cryptography algorithms that are also in use today like CAST-128 (block cipher), RC2 (block cipher) RC4 (stream cipher), RC5 (block cipher), Blowfish (block cipher  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/331-502">doi:10.5120/331-502</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/www6vmxahfgftmnmgq3s75c5iu">fatcat:www6vmxahfgftmnmgq3s75c5iu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922212818/http://www.ijcaonline.org/allpdf/pxc387502.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/eb/e7eb020565ea1dd47f8c87437d496a5b63ad6e7f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/331-502"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Light Weight Implementation of Stream Ciphers for M-Commerce Applications [article]

Mona Pourghasem, Elham Ghare Sheikhloo, Reza Ebrahimi Atani
<span title="2014-03-20">2014</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Then these algorithms were implemented on a variety of mobile phones and are compared with each other in terms of execution time and finally the obtained Results are expressed.  ...  In order to provide security, numerous techniques have been proposed which due to the limitations of mobile devices; an algorithm should be taken that have the ability to function for light weight ubiquitous  ...  Stream Ciphers are an important part of private key cryptography algorithms.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1404.4791v1">arXiv:1404.4791v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wftbxrquzzcwno3pipozw5ufle">fatcat:wftbxrquzzcwno3pipozw5ufle</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200903233913/https://arxiv.org/ftp/arxiv/papers/1404/1404.4791.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0d/bb/0dbb3ad1132cedd92621fba927205e4c091274b7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1404.4791v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Comparing Some Pseudo-Random Number Generators and Cryptography Algorithms Using a General Evaluation Pattern

Ahmad Gaeini, Abdolrasoul Mirghadri, Gholamreza Jandaghi, Behbod Keshavarzi
<span title="2016-09-08">2016</span> <i title="MECS Publisher"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/arieir5stvdafmqjc5uirmt37i" style="color: black;">International Journal of Information Technology and Computer Science</a> </i> &nbsp;
The main purpose of this paper is to certify the approved algorithm.  ...  In fact, given the g rowingly extensive types of pseudorandom sequences and block and stream cipher algorith ms, selection of an appropriate algorith m needs an accurate and thorough investigation.  ...  The algorith m is a stream cipher algorith m with a variab le key length, whose one of applications is W ireless Cryptography Protocol (WEP).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5815/ijitcs.2016.09.04">doi:10.5815/ijitcs.2016.09.04</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bqyvjmyv7rbl5bs5klgzuzkc2e">fatcat:bqyvjmyv7rbl5bs5klgzuzkc2e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427213303/http://www.mecs-press.org/ijitcs/ijitcs-v8-n9/IJITCS-V8-N9-4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/00/e8/00e8107acdcce35f1463ad601d4e1fa2abd6e0a0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5815/ijitcs.2016.09.04"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Cryptography: Security and Integrity of Data Management

Faisal Abbasi, Amity School of Engineering and Technology, AUUP, Lucknow Campus
<span title="">2021</span> <i title="A2Z Journals"> Journal of Management and Service Science (JMSS) </i> &nbsp;
There are many cryptography algorithms that are widely used to encrypt and decrypt data, some of them are AES algorithm, stream ciphers, DES algorithms, etc.  ...  With the advancement of technology, billion tons of da-ta have been accumulated over the internet.  ...  Modern Algorithm Stream ciphers With the advancement of modern computers, the encryption techniques took a completely new direction.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.54060/jmss/001.02.004">doi:10.54060/jmss/001.02.004</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5xropstwebdrjdtaldrvveu5ii">fatcat:5xropstwebdrjdtaldrvveu5ii</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220203235215/https://a2zjournals.com/jmss/uploadpdf/JMSS_V01_Is002_004.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/67/18/67184c69b05edb595596587b94f49ed6e614a9fa.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.54060/jmss/001.02.004"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Analysis of Cryptography Techniques

Ravi K Sheth
<span title="2015-02-27">2015</span> <i title="KnowledgeCuddle Publication"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/d243diyvz5erbkeswfnzvsgnjq" style="color: black;">INTERNATIONAL JOURNAL OF RESEARCH IN ADVANCE ENGINEERING</a> </i> &nbsp;
The protection of these confidential data from unauthorized access can be done with many encryption techniques.  ...  Cryptography is the process that involves encryption and decryption of text using various mechanisms or algorithms.  ...  Stream ciphers, in contrast to the 'block' type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-bycharacter.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26472/ijrae.v1i2.3">doi:10.26472/ijrae.v1i2.3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rp47ns4wmbegne5w5x3qxl6atu">fatcat:rp47ns4wmbegne5w5x3qxl6atu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722013444/https://knowledgecuddle.com/index.php/IJRAE/article/download/2/pdf_2" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c4/df/c4df488e77f578a53caca486ef5cb72edeeeded1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26472/ijrae.v1i2.3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A literature Review of Cryptography on RC4 Stream Cipher and Hash-LSB Steganography

<span title="2020-04-30">2020</span> <i title="IJREAM Publishing House"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/x7src3ndrnhkhhowy7y5vya7di" style="color: black;">International journal for research in engineering application &amp; management</a> </i> &nbsp;
This paper contains details about the RC4 encryption algorithm, and how steganography and encryption methods are used. The cryptography and steganography techniques ensure the security of the data.  ...  In the modern world with the emergence of technology, the entire network includes the digital data that adds new dimensions as to how data can be exchanged effectively and safely in real time from one  ...  output is then XORed with a digital image byte stream.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35291/2454-9150.2020.0308">doi:10.35291/2454-9150.2020.0308</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4nobg2y2sfcrfduvb7qw7oisoy">fatcat:4nobg2y2sfcrfduvb7qw7oisoy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200719005300/http://ijream.org/papers/IJREAMV06I0161125.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35291/2454-9150.2020.0308"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Comparison of a Chaotic Cryptosystem with Other Cryptography Systems

A. S. Alshammari
<span title="2020-10-26">2020</span> <i title="Engineering, Technology &amp; Applied Science Research"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lpxg3lmnljealhwgd4srjiuaqi" style="color: black;">Engineering, Technology &amp; Applied Science Research</a> </i> &nbsp;
The cryptosystem showed a high degree of security, as it had a keyspace of 2576, and it was compared with existing symmetric key cryptography systems, such as DES, 3DES, AES, Blowfish, and OTP.  ...  The scrambling scheme was developed and the Lorenz stream cipher binary stream successfully passed the NIST randomness test.  ...  Furthermore, symmetric key cryptography is divided into two types: block cipher and stream cipher.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.48084/etasr.3745">doi:10.48084/etasr.3745</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/w3g2yj2byjfjvbk7vyvq6kqcve">fatcat:w3g2yj2byjfjvbk7vyvq6kqcve</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201109190023/http://etasr.com/index.php/ETASR/article/download/3745/2330" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/79/b1/79b1d25a1b381f7b7c797927554f4f8e3d36953b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.48084/etasr.3745"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY

Grace Lamudur Arta Sihombing
<span title="2017-03-06">2017</span> <i title="Universitas Islam Sumatera Utara"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ozxum2z5ifcjrejqlvtucuol6a" style="color: black;">InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan)</a> </i> &nbsp;
And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman) algorithm.  ...  Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger  ...  ANALYSIS PROCESS The algorithm used to enkripi and decryption of messages in this study is a stream cipher algorithm. And hybrid cryptography to increase security message with the RSA algorithm.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.30743/infotekjar.v1i2.66">doi:10.30743/infotekjar.v1i2.66</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ohipnqsajvg67ppok4rkcuz3am">fatcat:ohipnqsajvg67ppok4rkcuz3am</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721210635/https://jurnal.uisu.ac.id/index.php/infotekjar/article/download/66/53" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/31/87/3187329b7aec2f2c778bf8a82bb339100c3d8efc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.30743/infotekjar.v1i2.66"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids [chapter]

Agus Setiawan, David Adiutama, Julius Liman, Akshay Luther, Rajkumar Buyya
<span title="">2004</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Today's cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state.  ...  An analysis and comparison of its performance is presented along with pointers to future work.  ...  The use of keys is complemented by the use of advanced algorithms. There are two methods that are used in symmetric key cryptography [1] : block and stream.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30501-9_171">doi:10.1007/978-3-540-30501-9_171</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2nxjurtmg5g6pdjl35bwyucyve">fatcat:2nxjurtmg5g6pdjl35bwyucyve</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705113416/http://www.cloudbus.org/~raj/papers/gridcrypt.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7e/f9/7ef9668d4e00d9fea87d18d2fffc2ba38de153ac.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30501-9_171"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Multiple Selective Regions Image Cryptography on Modified RC4 Stream Cipher

Mahfuzulhoq Chowdhury, Md. Moniruzzaman, Parijat Prashun Purohit
<span title="2014-06-30">2014</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/k7f2snpxzrhybfen3tkjr6uoa4" style="color: black;">International Journal of Grid and Distributed Computing</a> </i> &nbsp;
This approach is derived from the standard RC4 algorithm. But Currently RC4 is vulnerable. So for making image encryption technique more secure, we have proposed RC4 with chaos.  ...  This paper gives an initiation of an amending technique for multiple selective region image cryptography based on both RC4 stream cipher and chaos.  ...  One of the most used algorithms is RC4 stream cipher.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijgdc.2014.7.3.19">doi:10.14257/ijgdc.2014.7.3.19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y6r2ub72qzbbpfte4euwkkz7sa">fatcat:y6r2ub72qzbbpfte4euwkkz7sa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180601205301/http://www.sersc.org/journals/IJGDC/vol7_no3/19.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/87/42/8742ec4f763e0ab734cbf469e7dfebc5a7575fb3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijgdc.2014.7.3.19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Post-quantum cryptography

Daniel J. Bernstein, Tanja Lange
<span title="2017-09-13">2017</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/drfdii35rzaibj3aml5uhvr5xm" style="color: black;">Nature</a> </i> &nbsp;
Result of quantum cryptography is that Alice and Bob both know a stream of some more (e.g. 10 12 ) unpredictable secret bits. Length of the output stream increases linearly with the amount of time.  ...  Result of quantum cryptography is that Alice and Bob both know a stream of some more (e.g. 10 12 ) unpredictable secret bits. Length of the output stream increases linearly with the amount of time.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1038/nature23461">doi:10.1038/nature23461</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/28905891">pmid:28905891</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5yvzd7yifjgubasjtzfzdvpsoy">fatcat:5yvzd7yifjgubasjtzfzdvpsoy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191026232053/https://hyperelliptic.org/tanja/vortraege/indo-PQ.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/37/65/376556a7a98fd155cfa91c600fbe7d0de97dba2d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1038/nature23461"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> nature.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 16,851 results