Skip to search formSkip to main contentSkip to account menu

Cryptosystem

Known as: Crypto system, Cryptographic system, Cryptosystems 
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors… 
2012
2012
In this paper, the authors propose a new combined symmetric key cryptographic method, SJA-I, which basically has four steps… 
Highly Cited
2011
Highly Cited
2011
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors… 
2011
2011
Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for… 
2009
2009
—In this paper, a two factor scheme is proposed to generate cryptographic keys directly from biometric data, which unlike… 
2009
2009
In CHES 2006, M. Amir et al. introduced a generalized method of differential fault attack (DFA) against AES–128. Their fault… 
Review
2006
Review
2006
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide… 
2005
2005
This paper proposes an identity-based encryption (IBE) scheme based on traditional public-key cryptographic systems, such as RSA… 
2004
2004
2001
2001
Stream ciphers are often used in applications where high speed and low delay are a requirement. The ISAAC keystream generator is…