[PDF][PDF] Keyless user defined optimal security encryption
A Kaushik, M Barnela, A Kumar - International Journal of …, 2012 - researchgate.net
Cryptography and encryptions, these terms are now-a-days have an unseen impact in the
emerging field of network and its security. As security of data on any kind of system has …
emerging field of network and its security. As security of data on any kind of system has …
Chaos-based stream cipher for embedded systems
TQ Do, TT Van Anh, NX Quyen… - 2023 International …, 2023 - ieeexplore.ieee.org
This paper presents a novel lightweight stream cipher for embedded systems based on
chaos theory. The proposed cipher exploits the two-dimensional discretized Cat and …
chaos theory. The proposed cipher exploits the two-dimensional discretized Cat and …
Preventing IP source address spoofing: A two-level, state machine-based method
A signature-and-verification-based method, automatic peer-to-peer anti-spoofing (APPA), is
proposed to prevent IP source address spoofing. In this method, signatures are tagged into …
proposed to prevent IP source address spoofing. In this method, signatures are tagged into …
A novel fast hybrid cryptographic system: MARS4
A novel and fast technique for cryptographic applications is designed and developed using
the symmetric key algorithm" MAJE4" and the popular asymmetric key algorithm" RSA". The …
the symmetric key algorithm" MAJE4" and the popular asymmetric key algorithm" RSA". The …
Use of Novel Algorithms MAJE4 and MACJER-320 for Achieving Confidentiality and Message Authentication in SSL & TLS
M Sheena, K Poulose Jacob - 2008 - events.cusat.ac.in
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-
commerce has created a huge demand for information security. The Secure Socket Layer …
commerce has created a huge demand for information security. The Secure Socket Layer …
Keyless Averaging Encryption Algorithm
To achieve secure transmission during communication, secure transmission of data has
great importance. Information can be encrypted to ensure security can be done with through …
great importance. Information can be encrypted to ensure security can be done with through …
[PDF][PDF] OFDM Based Encryption and Decryption Techniques for Wireless Transfer of Sensitive Data
In this paper, we have investigated 8 different types of encryption methods which can be
applied to an OFDM system and compared the merits and demerits to determine which …
applied to an OFDM system and compared the merits and demerits to determine which …
Message Integrity in the World Wide Web: Use of Nested Hash Function and a Fast Stream Cipher
The focus of this work is to provide authentication and confidentiality of messages in a swift
and cost effective manner to suit the fast growing Internet applications. A nested hash …
and cost effective manner to suit the fast growing Internet applications. A nested hash …
The automatic peer-to-peer signature for source address validation
Abstract SPM (Spoofing Prevention Method) proposed a peer-to-peer anti-spoofing method
which could effectively filter spoofed packets and support incremental deployment. However …
which could effectively filter spoofed packets and support incremental deployment. However …
[PDF][PDF] An Exquisite Cryptographic Algorithm for Lesser Amount of Data
Once an application steps out of the bounds of a single-computer box, its external
communication is immediately exposed to a multitude of outside observers with various …
communication is immediately exposed to a multitude of outside observers with various …