• Nenhum resultado encontrado

[PDF] Top 20 A Symmetric Key Algorithm for Cryptography using Music

Has 10000 "A Symmetric Key Algorithm for Cryptography using Music" found on our website. Below are the top 20 most common "A Symmetric Key Algorithm for Cryptography using Music".

A Symmetric Key Algorithm for Cryptography using Music

A Symmetric Key Algorithm for Cryptography using Music

... days music and musical notation have been used for the cryptographic ...cipher algorithm on those ...messages using ringing bells in prearranged ... See full document

7

NEW APPROACH IN SYMMETRIC BLOCK CIPHER SECURITY USING A NEW CUBICAL TECHNIQUE

NEW APPROACH IN SYMMETRIC BLOCK CIPHER SECURITY USING A NEW CUBICAL TECHNIQUE

... The act of cracking or breaking a cipher involves extracting the plain text from the cipher text with no knowledge of the key and frequently with no encryption algorithm information. The strength of a ... See full document

7

Neural Synchronization Using Genetic Algorithm for Secure Key Establishment

Neural Synchronization Using Genetic Algorithm for Secure Key Establishment

... of key exchange is one of the main concern of classical cryptography and it was extensively studied in classical ...published key exchange protocol was based on number theory and it is known by ... See full document

5

CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS-SIMULATION USING NS2

CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS-SIMULATION USING NS2

... RSA algorithm. Elliptic Curve Cryptography (ECC) is a cryptographic technique eminently suited for small devices, like those used in wireless communications and is gaining ... See full document

9

PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices

PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices

... used symmetric key block cipher in computer security due to its standardization by the NIST (National Institute of Standards and Technology) and all the cryptanalysis published on this algorithm, ... See full document

23

On group rings and some of their applications to combinatorics and symmetric cryptography

On group rings and some of their applications to combinatorics and symmetric cryptography

... below, using group rings, we may give a unifying treatment of various differential cryptanalyses, namely, the classical differential cryptanalysis, impossible differential cryptanalysis, truncated differential ... See full document

14

A Password-Based Key Derivation Algorithm Using the KBRP Method

A Password-Based Key Derivation Algorithm Using the KBRP Method

... for cryptography and authentication, where a key is a sequence of characters that controls the process of a cryptographic or authentication algorithm [1,2] ...Strong key derivation has become ... See full document

6

A Survey on Recent Security Trends using Quantum Cryptography

A Survey on Recent Security Trends using Quantum Cryptography

... Classical cryptography techniques have proved very helpful for this ...mathematical algorithm in these foreseeable ...quantum cryptography can seriously threat their ...quantum cryptography ... See full document

5

A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security

A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security

... by using a new methodology sharing the concept of hybridization and a multilevel of security of data is ...like music, film, publishing and organization like ministry and military will definitely be highly ... See full document

12

Authenticated Broadcast in Heterogeneous Wireless Sensor Networks using Chinese Remainder Theorem Algorithm

Authenticated Broadcast in Heterogeneous Wireless Sensor Networks using Chinese Remainder Theorem Algorithm

... for key agreement between nodes ...asymmetric cryptography using public key algorithm for key agreement (Diffie- Hellman, RSA) which needs high computation capability and energy ... See full document

5

Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme

Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme

... In the scheme, one pixel of the original image is reproduced by m sub pixels on the sheets. The pixel is considered “on” (transparent) if the number of transparent sub pixels is more than a constant threshold, and ... See full document

5

Data Security With Colors Using Rsa

Data Security With Colors Using Rsa

... Today, cryptography is used to provide secrecy and integrity to our data, and both authentication and anonymity to our ...(or algorithm), only the secrecy of the ... See full document

5

Modified Novel Quantum Key Exchange using BB84 Algorithm

Modified Novel Quantum Key Exchange using BB84 Algorithm

... With the increasing number of eavesdroppers on communication channels, securing the reliability of digital communication has become a herculean task. For any communication and information exchange the most important step ... See full document

4

Architecture for the Secret-Key BC3 Cryptography Algorithm

Architecture for the Secret-Key BC3 Cryptography Algorithm

... public- key. The secret-key (symmetric key) algorithm uses same key for encryption and decryption so this key must be kept ...public-key algorithm uses ... See full document

16

A Sturdy Compression based Cryptography Algorithm using Self-Key (ASCCA)

A Sturdy Compression based Cryptography Algorithm using Self-Key (ASCCA)

... This algorithm provides security to the Data/SMS in handheld ...and Cryptography algorithms for providing security to the data in handheld ...other symmetric key cryptography algorithms ... See full document

10

A Fast DOA Estimation Algorithm Based on Polarization MUSIC

A Fast DOA Estimation Algorithm Based on Polarization MUSIC

... ESPRIT-like algorithm to partially polarized sources. [22, 23] provide an algorithm based on sparse ULA, consisting of sensors which can measure all six electrical and magnetic ...rooting algorithm ... See full document

12

Fostering e-government in Brazil: a case study of digital certification adoption

Fostering e-government in Brazil: a case study of digital certification adoption

... In the rise of the new Information and Communication Technologies (ICT), governments worldwide as well companies go through a transition, trying to adapt themselves to the Knowledge Society demands. Such innova- tive ... See full document

23

Verification of symmetric models using semiautomatic abstractions

Verification of symmetric models using semiautomatic abstractions

... structure using first-order propositional ...made using BDDs, which are data structures that discard redundant information in the representation of boolean formulas and have efficient algorithms for their ... See full document

88

Arq. NeuroPsiquiatr.  vol.67 número1

Arq. NeuroPsiquiatr. vol.67 número1

... when it is dificult to express feelings through words. In this context, the therapist, based on the history of the patient musical life, can make possible new arrangements for the self. The role of musical culture in ... See full document

4

Detection of Unauthorized Human Entity in Surveillance Video

Detection of Unauthorized Human Entity in Surveillance Video

... Abstract--With the ever growing need for video surveillance in various fields, it has become very important to automate the entire process in order to save time, cost and achieve accuracy. In this paper we propose a ... See full document

8

Show all 10000 documents...