Author:
Deshmukh Maroti,Rawat Arjun Singh
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference27 articles.
1. Bokhari MU, Shallal QM (2016) A review on symmetric key encryption techniques in cryptography. Int J Comput Appl 147(10):43–48
2. Abdullah AM (2017) Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptogr Netw Secur 16:1–11
3. Han S-J, Oh H-S, Park J (1996) The improved data encryption standard (DES) algorithm. In: Proceedings of ISSSTA’95 international symposium on spread spectrum techniques and applications, vol 3. IEEE, Mainz, Germany, pp 1310–1314
4. Knudsen LR et al (1998) On the design and security of RC2. In: International workshop on fast software encryption. Springer, Berlin
5. Noura M et al (2018) S-DES: an efficient and secure DES variant. In: IEEE middle east and north Africa communications conference (MENACOMM), IEEE, Jounieh, Lebanon, pp 1–6
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Deterministic Rabin Cryptosystem Using Cubic Congruence and Chinese Remainder Theorem;Wireless Personal Communications;2024-07-17
2. Securing Image using Triple Data Encryption Standard;2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT);2024-05-03
3. SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication;International Journal of System Assurance Engineering and Management;2024-02-13
4. Secure key sharing scheme using Hamiltonian path;International Journal of Information Technology;2023-09-26