James Nechvatal

Learn More
This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may be used in many cryptographic applications, such as the generation of key material. Generators suitable for use in cryptographic applications may need to meet stronger requirements than for other applications. In(More)
In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST's statutory responsibilities. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the(More)
National Institute of Standards and Technology, Gaithersburg, MD 20899-0001 In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST’s statutory responsibilities. In 1998, NIST announced the(More)
PREFACE This publication presents a state-of-the-art survey of public-key cryptography circa 1988-1990. In doing so, it covers a number of different topics including: 1. The theory of public-key cryptography. 2. Comparisons to conventional (secret-key) cryptography. 3. A largely self-contained summary of relevant mathematics. 4. A survey of major existing(More)
Status Report on the First Round of the Development of the Advanced Encryption Standard 114 kb James Nechvatal, Elaine Barker, Donna Dodson, Morris Dworkin, James Foti, and Edward Roback Measurement of the Rheological Properties of High Performance Concrete: State of the Art Report 408 kb Chiara F. Ferraris On the Diffraction Limit for Lensless Imaging 99(More)
Previously algorithms have been developed to solve the above and similar problems for two variables. The approximation scheme developed herein extends at least to three variables. It makes critical use of Farey fractions. The essence of the strategy is to obtain the solution of a related optimization problem recursively in terms of the solutions of(More)
  • Naser Aghajanzadeh, Fatemeh Aghajanzadeh, +5 authors andLawrence Bassham
  • 2013
This paper aims at developing a new hybrid cipher by combining the characteristics of 3 ciphers namely AES (Advanced Encryption Standard),Rc4 (also known as ARC4) and Serpent. The characteristics of both the ciphers are studied and a new cipher combining the characteristics of both the ciphers is generated which is more secure than the original ciphers.(More)
  • 1