Abstract. The encryption/decryption processes is applied to text. Both algorithms involved the use of the associative models, in particular we propose the Alpha-Beta associative memories. The original text is divide in sets of 9 elements, and together with a secret key they build an associative memory which represents the encrypted text. The advantage of our proposal is the cyphertext does not have the same dimension that the plaintext. Additionally, the cyphertext is represented as an image, therefore, since the beginning the encrypted text has a different meaning
Abstract — This paper is presenting cryptography model of block based cipher technique. This model i...
Data security and protection is one of the most common technologies used in the field of computer s...
Abstract—Nowadays, after the significant development in the Internet, communication and information ...
In this study an encryption/decryption algorithm is proposed and developed. The developed algorithm ...
In this paper we have developed a new symmetric key algorithm for encryption and decryption of data ...
Nowadays, the computer network has changed the mode of people's communication. People can easil...
Abstract: With the development of the digital devices, computers and networks, our world relies more...
AbstractSecurity is the biggest concern for any information transferred in the world of Internet. So...
This work describes a novel method for encrypting gray-scale images using an associative approach. T...
A new algorithm for text compression is presented. The basic idea of the algorithm is to define a un...
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text cipher...
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encr...
Abstrac:- This paper describes a new method for authenticating and encrypting messages. Our method e...
Cryptography refers to protecting transmitted information from unauthorized interception or tamperin...
Abstract — Encryption is the process of encoding messages or information in such a way that only aut...
Abstract — This paper is presenting cryptography model of block based cipher technique. This model i...
Data security and protection is one of the most common technologies used in the field of computer s...
Abstract—Nowadays, after the significant development in the Internet, communication and information ...
In this study an encryption/decryption algorithm is proposed and developed. The developed algorithm ...
In this paper we have developed a new symmetric key algorithm for encryption and decryption of data ...
Nowadays, the computer network has changed the mode of people's communication. People can easil...
Abstract: With the development of the digital devices, computers and networks, our world relies more...
AbstractSecurity is the biggest concern for any information transferred in the world of Internet. So...
This work describes a novel method for encrypting gray-scale images using an associative approach. T...
A new algorithm for text compression is presented. The basic idea of the algorithm is to define a un...
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text cipher...
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encr...
Abstrac:- This paper describes a new method for authenticating and encrypting messages. Our method e...
Cryptography refers to protecting transmitted information from unauthorized interception or tamperin...
Abstract — Encryption is the process of encoding messages or information in such a way that only aut...
Abstract — This paper is presenting cryptography model of block based cipher technique. This model i...
Data security and protection is one of the most common technologies used in the field of computer s...
Abstract—Nowadays, after the significant development in the Internet, communication and information ...