New effective information encryption algorithms

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Histogram based comparison on Symmetric Encryption Algorithms of Information Security

Information sharing and transfer of secured data is a challenging issue in Internet and Network applications, so there is a need to protect such applications. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. There are so many Symmetric Encry...

متن کامل

New Chaotic Information Security Algorithms

In this paper, new information security algorithms using a Rossler chaotic function are suggested, which contain image encryption, data encryption and data hiding. In designing the image encryption algorithm, a chaotic block was used to change the pixels value using the target pixels in each block. The experiments show that the system performance is improved and the cipher image characteristics...

متن کامل

Proxy Re-encryption with Keyword Search: New Definitions and Algorithms

We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (RedPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model, along with the proofs.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ukrainian Information Security Research Journal

سال: 2012

ISSN: 2410-7840,2221-5212

DOI: 10.18372/2410-7840.14.3504