Research on the Programming Language for Symmetric Cryptographic Algorithms

F Li, J Yan, R Xie, J Ma - Chinese Journal of Electronics, 2010 - ieeexplore.ieee.org
The Programming language for symmetric cryptographic algorithms (PLSCA) is proposed.
The detailed specification of the syntax of PLSCA is presented, and the cipher of IDEA is …

A unified improvement of the AES algorithm

Y Zhang, A Chen, B Chen - Multimedia Tools and Applications, 2022 - Springer
Symmetric cryptography is widely used in information exchange and storage. The advanced
encryption standard (AES) is one of the most important symmetric ciphers. Based on the …

Modern and Lightweight Component-based Symmetric Cipher Algorithms

SA Qassir, MT Gaata, AT Sadiq - ARO-The Scientific …, 2022 - eprints.koyauniversity.org
Information security, being one of the corner stones of network and communication
technology, has been evolving tremendously to cope with the parallel evolution of network …

Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA)

T Teerakanok, S Kamolphiwong - 2009 6th International …, 2009 - ieeexplore.ieee.org
In this day, the necessity of security and protection of computer information on network has
become more and more important. In cryptography, asymmetric-key is the framework with …

Designing and performance analysis of a proposed symmetric cryptography algorithm

BK Mandal, D Bhattacharyya… - … Systems and Network …, 2013 - ieeexplore.ieee.org
We design an algorithm to merge both RSA algorithm and Diffie-Hellman Algorithm of them
to provide a user with even higher level of data security. Actually, our intent is to secure data …

Design and implementation of the components of the symmetric cryptographic algorithm

Y Ci, G Shi, F Yang, J Diao, C Liu… - 2017 IEEE Second …, 2017 - ieeexplore.ieee.org
Cryptographic technology is the basic and core technology to guarantee network and
information security. It is imperative to standardize cryptographic algorithms. Cryptographic …

Content based symmetric key algorithm

M Shrivastava, S Jain, P Singh - Procedia Computer Science, 2016 - Elsevier
With the growth in technology, there is always a need of good encryption method which may
provide better security and authenticity with lesser computational complexities. Although …

[PDF][PDF] Performance analysis of a symmetric cryptographic algorithm on multicore architectures

A Pousa, V Sanz, A de Giusti - Computer Science & Technology …, 2012 - sedici.unlp.edu.ar
In this paper, a performance analysis of the symmetric encryption algorithm AES (Advanced
Encryption Standard) on various multicore architectures is presented. To this end, three …

Modern symmetric ciphers—Des and Aes

D Buell - Fundamentals of Cryptography: Introducing …, 2021 - Springer
In a symmetric cryptosystem, the key used for encrypting a message is the same as the key
used for decrypting a message. Although this does place a burden of proper key …

New DES based on Elliptic Curves

G Abdelmouez, FS Helail… - International Journal of …, 2010 - publications.waset.org
It is known that symmetric encryption algorithms are fast and easy to implement in hardware.
Also elliptic curves have proved to be a good choice for building encryption system …