key length
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
20
Automated Cryptanalysis of Transposition Ciphers Using Cuckoo Search Algorithm
10
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading
20
A ROBUST FRAMEWORK TO DETECT MOVING VEHICLES IN DIFFERENT ROAD CONDITIONS IN INDIA
14
A trusted evidence model for cloud platform
5
Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing
18
Improving GGH Public Key Scheme Using Low Density Lattice Codes
6
Implementation of Advanced Encryption Standard (AES) Algorithm on FPGA
6
analyze the kasiski method against vigenere cipher
9
A High-Secure Vlsi Architecture For Advanced Encryption Standard (Aes) Algorithm
5
Data Encryption and Decryption Using By Triple DES Performance Efficiency Analysis of Cryptosystem
11
Three-Pass Protocol Scheme using Gronsfeld and Vigenere Ciphers
6
Implementation of AES Algorithm and Improve Throughput
7
Separations in Circular Security for Arbitrary Length Key Cycles
18
Title: MINIMIZATION OF DELAY TIME IN DYNAMIC ENCRYPTION ALGORITHM FOR REAL-TIME APPLICATIONS (DEA-RTA)
8
Functional Analysis of Two Brassinosteroid Responsive, Putative Calmodulin-Binding Proteins 60 (CBP60S) in Arabidopsis Thaliana
92
Optimizing Search for Fast Query Retrieval in Object Oriented Databases Using Signature Declustering Ms. Ankita Thakur 1, Ms. Meena Chauhan2
5
A New Group Signature Scheme using IBE
7
Challenges and opportunities for reinvigorating the physician scientist pipeline
6
Growing season length as a key factor of cumulative net ecosystem exchange over the pine forest ecosystems in Europe
7