As more increase in usage of communications and developing them more user friendly. While developing those communications, we need to take care of security and safety of user’s data. Many researchers have developed many complex algorithms to maintain security in user’s application. Among those one of the best algorithms are cryptography based, in which user will be safe side mostly from the attackers. We already had some AES algorithm which uses very complex cryptographic algorithm to increase the performance and more usage of lookup tables. So the cache timing attackers will correlates the details to encrypt the data under known key with the unknown key. So, for this we provide an improvised solution. This paper deals with an extension of...
The most important requirement for the encryption system is its durability. Unfortunately, increasin...
We introduce and study a new notion of enhanced chosen-ciphertext security (ECCA) for public-key enc...
Cryptography is the technique in which usually a file is converted into unreadable format by using p...
AbstractData security has a major role in the development of communication system, where more random...
It is generally accepted that data encryption is the key role in current and future technologies for...
Securing multimedia applications becomes a major challenge with the violation of the information inc...
This paper implements an efficient hybridencryption that combines symmetric key encryption,one time ...
Cryptography is the art or technique of encoding a message by a sender in such a manner that only th...
Cloud computing is a technology through which data can be stored and access at remote server without...
ABSTRACT: Network Security is the most vital component in information security because it is respons...
Elliptic curve cryptography (ECC) is an approach to public key Cryptography based on the algebraic s...
In trusted computing architecture, security is one of crucial aspects to protect the design against ...
To be a part of this modern society, we have to register for online accounts and have to swallow the...
SummaryThere are many cryptographic systems that use complex operations involving substitutions and ...
Elliptic curve cryptography or ECC is a public-key cryptosystem. This paper introduces ECC and descr...
The most important requirement for the encryption system is its durability. Unfortunately, increasin...
We introduce and study a new notion of enhanced chosen-ciphertext security (ECCA) for public-key enc...
Cryptography is the technique in which usually a file is converted into unreadable format by using p...
AbstractData security has a major role in the development of communication system, where more random...
It is generally accepted that data encryption is the key role in current and future technologies for...
Securing multimedia applications becomes a major challenge with the violation of the information inc...
This paper implements an efficient hybridencryption that combines symmetric key encryption,one time ...
Cryptography is the art or technique of encoding a message by a sender in such a manner that only th...
Cloud computing is a technology through which data can be stored and access at remote server without...
ABSTRACT: Network Security is the most vital component in information security because it is respons...
Elliptic curve cryptography (ECC) is an approach to public key Cryptography based on the algebraic s...
In trusted computing architecture, security is one of crucial aspects to protect the design against ...
To be a part of this modern society, we have to register for online accounts and have to swallow the...
SummaryThere are many cryptographic systems that use complex operations involving substitutions and ...
Elliptic curve cryptography or ECC is a public-key cryptosystem. This paper introduces ECC and descr...
The most important requirement for the encryption system is its durability. Unfortunately, increasin...
We introduce and study a new notion of enhanced chosen-ciphertext security (ECCA) for public-key enc...
Cryptography is the technique in which usually a file is converted into unreadable format by using p...