Mathematical analysis and simulation of multiple keys and S-boxes in a multinode network for secure transmission
From MaRDI portal
Publication:4902835
DOI10.1080/00207160.2012.704022zbMATH Open1255.94060OpenAlexW2005403016MaRDI QIDQ4902835FDOQ4902835
Authors: Ajay Kakkar, M. L. Singh, P. K. Bansal
Publication date: 18 January 2013
Published in: International Journal of Computer Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/00207160.2012.704022
Recommendations
- Hybrid symmetric cryptography approach for secure communication in web application
- An improvised version of Hill’s cipher
- An optimal algorithm to assign cryptographic keys in a tree structure for access control
- The block cipher algorithm-properties, encryption efficiency analysis and security evaluation
- Key management associated with symmetric and asymmetric cryptography
Cites Work
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Numerical transient analysis of Markov models
- Strong Conditional Oblivious Transfer and Computing on Intervals
- Title not available (Why is that?)
- Foiling birthday attacks in length-doubling transformations
- Conditional Encrypted Mapping and Comparing Encrypted Numbers
Cited In (3)
This page was built for publication: Mathematical analysis and simulation of multiple keys and S-boxes in a multinode network for secure transmission
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4902835)