The Four Stage Encryption System introduced by Acharyulu and Appaji provides secrecy even when the attacker has some samples of plain texts and their corresponding cipher texts obtained with the same key, because the cipher text generated each time, for the same plain text with the same key, is different. In other words, the system is secure against adaptive chosen-plain text attack. Another interesting feature is that even the size of the cipher text, for given plain text under a given key, is unpredictable. In this paper the four stage encryption system is generalized as Generated Partitioned Output Crypto System and some variations that can be taken up are suggested. A pure mathematical system called Partitioned Output Crypto System is i...
In this paper, we propose a new method called Ambiguous Multi-Symmetric Cryptography (AMSC) that con...
Symmetric cryptography will always produce the same ciphertext if the plaintext and the given key ar...
The need of keeping information securely began thousands of years. The practice to keep the informat...
We propose a generalization of a variant of Paillier Cryptosystem that is an additive homomor-phic C...
Even, Goldreich and Micali showed at Crypto'89 that the existence of signature schemes secure agains...
Security of information cannot be perfectly realized as both it and its counter technology continue ...
Sensitive electronic data must often be kept confidential over very long periods of time. Known solu...
. We present a generalization of Shamir's threshold scheme [5]. The Shamir's scheme shows ...
textDaily advancements in technology influence many aspects of society. In today’s political and eco...
This paper analyzes the security of a new multistage encryption system (MES) recently proposed in IS...
Abstract: Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digi...
In this paper we propose a scheme of encryption for Block ciphers in N-alphabet, where every member ...
The process of exchanging information is called Communication. The basic Communication system involv...
In this paper some new mathematical techniques used in the design and analysis of cipher systems hav...
Ambiguous Multi Symmetric Cryptography AMSC that hide multiple plain texts in a cipher text using th...
In this paper, we propose a new method called Ambiguous Multi-Symmetric Cryptography (AMSC) that con...
Symmetric cryptography will always produce the same ciphertext if the plaintext and the given key ar...
The need of keeping information securely began thousands of years. The practice to keep the informat...
We propose a generalization of a variant of Paillier Cryptosystem that is an additive homomor-phic C...
Even, Goldreich and Micali showed at Crypto'89 that the existence of signature schemes secure agains...
Security of information cannot be perfectly realized as both it and its counter technology continue ...
Sensitive electronic data must often be kept confidential over very long periods of time. Known solu...
. We present a generalization of Shamir's threshold scheme [5]. The Shamir's scheme shows ...
textDaily advancements in technology influence many aspects of society. In today’s political and eco...
This paper analyzes the security of a new multistage encryption system (MES) recently proposed in IS...
Abstract: Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digi...
In this paper we propose a scheme of encryption for Block ciphers in N-alphabet, where every member ...
The process of exchanging information is called Communication. The basic Communication system involv...
In this paper some new mathematical techniques used in the design and analysis of cipher systems hav...
Ambiguous Multi Symmetric Cryptography AMSC that hide multiple plain texts in a cipher text using th...
In this paper, we propose a new method called Ambiguous Multi-Symmetric Cryptography (AMSC) that con...
Symmetric cryptography will always produce the same ciphertext if the plaintext and the given key ar...
The need of keeping information securely began thousands of years. The practice to keep the informat...