Mathematical analysis and simulation of multiple keys and S-Boxes in a multinode network for secure transmission
From MaRDI portal
Publication:4902835
DOI10.1080/00207160.2012.704022zbMath1255.94060MaRDI QIDQ4902835
M. L. Singh, Ajay Kakkar, P. K. Bansal
Publication date: 18 January 2013
Published in: International Journal of Computer Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/00207160.2012.704022
94A60: Cryptography
Cites Work
- Unnamed Item
- Numerical transient analysis of Markov models
- Foiling Birthday Attacks in Length-Doubling Transformations
- Conditional Encrypted Mapping and Comparing Encrypted Numbers
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Strong Conditional Oblivious Transfer and Computing on Intervals