[PDF][PDF] Keyless user defined optimal security encryption

A Kaushik, M Barnela, A Kumar - International Journal of …, 2012 - researchgate.net
Cryptography and encryptions, these terms are now-a-days have an unseen impact in the
emerging field of network and its security. As security of data on any kind of system has …

Chaos-based stream cipher for embedded systems

TQ Do, TT Van Anh, NX Quyen… - 2023 International …, 2023 - ieeexplore.ieee.org
This paper presents a novel lightweight stream cipher for embedded systems based on
chaos theory. The proposed cipher exploits the two-dimensional discretized Cat and …

Preventing IP source address spoofing: A two-level, state machine-based method

J Bi, B Liu, J Wu, Y Shen - Tsinghua Science and Technology, 2009 - ieeexplore.ieee.org
A signature-and-verification-based method, automatic peer-to-peer anti-spoofing (APPA), is
proposed to prevent IP source address spoofing. In this method, signatures are tagged into …

A novel fast hybrid cryptographic system: MARS4

S Mathew, KP Jacob - 2006 Annual IEEE India Conference, 2006 - ieeexplore.ieee.org
A novel and fast technique for cryptographic applications is designed and developed using
the symmetric key algorithm" MAJE4" and the popular asymmetric key algorithm" RSA". The …

Use of Novel Algorithms MAJE4 and MACJER-320 for Achieving Confidentiality and Message Authentication in SSL & TLS

M Sheena, K Poulose Jacob - 2008 - events.cusat.ac.in
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-
commerce has created a huge demand for information security. The Secure Socket Layer …

Keyless Averaging Encryption Algorithm

R Ali, MS Ali, Z Zaland - Journal of Applied and Emerging …, 2016 - journal.buitms.edu.pk
To achieve secure transmission during communication, secure transmission of data has
great importance. Information can be encrypted to ensure security can be done with through …

[PDF][PDF] OFDM Based Encryption and Decryption Techniques for Wireless Transfer of Sensitive Data

R Santhakumar, D Kumutha, S Balaji… - International Journal of …, 2015 - researchgate.net
In this paper, we have investigated 8 different types of encryption methods which can be
applied to an OFDM system and compared the merits and demerits to determine which …

Message Integrity in the World Wide Web: Use of Nested Hash Function and a Fast Stream Cipher

S Mathew, KP Jacob - 2006 International Conference on …, 2006 - ieeexplore.ieee.org
The focus of this work is to provide authentication and confidentiality of messages in a swift
and cost effective manner to suit the fast growing Internet applications. A nested hash …

The automatic peer-to-peer signature for source address validation

Y Shen, J Bi, J Wu, Q Liu - … : 11th International Conference, KES 2007, XVII …, 2007 - Springer
Abstract SPM (Spoofing Prevention Method) proposed a peer-to-peer anti-spoofing method
which could effectively filter spoofed packets and support incremental deployment. However …

[PDF][PDF] An Exquisite Cryptographic Algorithm for Lesser Amount of Data

A Kaushik, MB Satvika, O Parkash - academia.edu
Once an application steps out of the bounds of a single-computer box, its external
communication is immediately exposed to a multitude of outside observers with various …