Study of cryptographic key permutation choose for enhancing DES encryption intensity

被引:0
|
作者
Ma, Yinhua
Liu, Mingsheng
Wang, Shuhai
Zuo, Jinyu
机构
来源
Jisuanji Gongcheng/Computer Engineering | 2000年 / 26卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:68 / 69
相关论文
共 50 条
  • [1] Random key encryption a new cryptographic scheme
    Shafeeq, Muhammad
    Durrani, Mehr Yahya
    Afzal, Ifraseab
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 59 - +
  • [2] Certificateless public key encryption with cryptographic reverse firewalls
    Zhou, Yuyang
    Guo, Jing
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 109
  • [3] Cryptographic security for IoT : Leveraging Feistel-permutation network for enhanced encryption
    Singh, Kiran Deep
    Singh, Prabh Deep
    Saini, G. L.
    Panwar, Deepak
    Goyal, Dinesh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 559 - 568
  • [4] Binary Key Based Permutation For Medical Image Encryption
    Bhopi, Sachin Kailas
    Dongre, Nilima M.
    Gulwani, Reshma R.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 343 - 347
  • [5] Permutation polynomials and a new public-key encryption
    Khachatrian, Gurgen
    Kyureghyan, Melsik
    DISCRETE APPLIED MATHEMATICS, 2017, 216 : 622 - 626
  • [6] Securing Visual Cryptographic Shares using Public Key Encryption
    Kaur, Kulvinder
    Khemchandani, Vineeta
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1108 - 1113
  • [7] Two-Key Dependent Permutation for Use in Symmetric Cryptographic System
    Kuppusamy, Arulmani
    Iyer, Swaminathan Pitchai
    Krithivasan, Kannan
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [8] CRYPTOGRAPHIC KEY MANAGEMENT SCHEME FOR IMPLEMENTING DATA ENCRYPTION STANDARD
    EHRSAM, WF
    MATYAS, SM
    MEYER, CH
    TUCHMAN, WL
    IBM SYSTEMS JOURNAL, 1978, 17 (02) : 106 - 125
  • [9] CHOOSING ENCRYPTION - DES OR PRIVATE KEY
    JOHNSTON, RE
    INFOSYSTEMS, 1985, 32 (07): : 36 - 36
  • [10] A CRYPTOGRAPHIC STUDY ON S—BOXES OF DES TYPE Ⅱ——AN ENTROPY LEAKAGE ANALYSIS FOR THE KEY
    曾肯成
    戴宗铎
    杨君辉
    SystemsScienceandMathematicalSciences, 1991, (04) : 302 - 308