[PDF][PDF] Image encryption using advanced hill cipher algorithm

B Acharya, SK Panigrahy, SK Patra… - International Journal of …, 2009 - academia.edu
The Hill cipher algorithm is one of the symmetric key algorithms that have several
advantages in data encryption. But, the inverse of the key matrix used for encrypting the …

Design of a robust cryptosystem algorithm for non-invertible matrices based on hill cipher

R Hamamreh, M Farajallah - 2009 - scholar.ppu.edu
Information security is an important issue. Hill Cipher is one of the most famous symmetric
cryptosystem that can be used to protect information from unauthorized access. Hill cipher is …

The green500 list: Year one

WC Feng, T Scogland - 2009 IEEE International Symposium on …, 2009 - ieeexplore.ieee.org
The latest release of the Green500 List in November 2008 marked its one-year anniversary.
As such, this paper aims to provide an analysis and retrospective examination of the …

[PDF][PDF] Involutory, permuted and reiterative key matrix generation methods for hill cipher system

B Acharya, SK Patra, G Panda - International Journal of Recent …, 2009 - academia.edu
The Hill matrix algorithm is known for being the first purely algebraic cryptographic system
and for starting the entire field of algebraic cryptology. Hill cipher's susceptibility to …

Invertible, involutory and permutation matrix generation methods for hill cipher system

B Acharya, D Jena, SK Patra… - … Conference on Advanced …, 2009 - ieeexplore.ieee.org
Hill cipher's susceptibility to cryptanalysis has rendered it unusable in practice, it still serves
an important pedagogical role in both cryptology and linear algebra. Hill cipher requires …

On the privacy protection of biometric traits: palmprint, face, and signature

SK Panigrahy, D Jena, SB Korra, SK Jena - … International Conference, IC3 …, 2009 - Springer
Biometrics are expected to add a new level of security to applications, as a person
attempting access must prove who he or she really is by presenting a biometric to the …

HSX cryptosystem and its application to image encryption

B Acharya, SK Shukla, SK Panigrahy… - … on Advances in …, 2009 - ieeexplore.ieee.org
Information security is an important issue. Today's encryption technologies can be traced
back to the earliest ciphers, and have grown as a result of evolution. The first ciphers were …

[PDF][PDF] Evaluation of potential manufacturing suppliers using analytical hierarchy process and cluster analysis for benchmarking

A Adnan, A Cazan, M Safa, AWM Lung… - International Journal of …, 2009 - researchgate.net
This paper proposes an assessment method for the potential outsourcees (suppliers) in
agreement with the benchmark evaluated for a set of surveyed UK based companies. The …

Modified Hill-Cipher and CRT Methods in Galois Field GF (2^ M) for Cryptography

J Majhi - 2009 - ethesis.nitrkl.ac.in
Security can only be as strong as the weakest link. In this world of Cryptography, it is now
well established, that the weakest link lies in the implementation of cryptographic algorithms …

E-store portal system using distributed database

حنيحن, عياد, بيان, ابو ريان - 2009‎ - scholar.ppu.edu
يهدف هذا المشروع لتنظيم وادارة عمل المخازن باستخدام موقع الكتروني فعال يستخدم ميزة قواعد
البيانات الموزعة (Distributed database) ويتم التعامل مع هذا النظام من قبل ثلاثة مجموعات من …