Learn More
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the(More)
In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST's statutory responsibilities. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the(More)
In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST's statutory responsibilities. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the(More)
We study here an approximation scheme suitable for knapsack and related problems, such as alx I + a2x 2 + ... Previously algorithms have been developed to solve the above and similar problems for two variables. The approximation scheme developed herein extends at least to three variables. It makes critical use of Farey fractions. The essence of the strategy(More)
  • Naser Aghajanzadeh, Fatemeh Aghajanzadeh, +5 authors andLawrence Bassham
  • 2013
This paper aims at developing a new hybrid cipher by combining the characteristics of 3 ciphers namely AES (Advanced Encryption Standard),Rc4 (also known as ARC4) and Serpent. The characteristics of both the ciphers are studied and a new cipher combining the characteristics of both the ciphers is generated which is more secure than the original ciphers.(More)
  • 1