Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,716,050 papers from all fields of science
Search
Sign In
Create Free Account
Cryptosystem
Known as:
Crypto system
, Cryptographic system
, Cryptosystems
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
Adversary (cryptography)
Algorithm
Arjen Lenstra
Backdoor (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation And MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm
B. Nagar
2013
Corpus ID: 61319372
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors…
Expand
2012
2012
An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modifi
Somdip Dey
,
J. Nath
,
A. Nath
2012
Corpus ID: 1259822
In this paper, the authors propose a new combined symmetric key cryptographic method, SJA-I, which basically has four steps…
Expand
Highly Cited
2011
Highly Cited
2011
New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm
Neeraj Khanna
,
J. Nath
,
Joel James
,
Sayantan Chakraborty
,
A. Chakrabarti
,
A. Nath
International Conference on Communication Systems…
2011
Corpus ID: 45219711
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors…
Expand
2011
2011
Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter
A. El-Sisi
˜The œinternational Arab journal of information…
2011
Corpus ID: 10837416
Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for…
Expand
2009
2009
Application of Biometrics to Obtain High Entropy Cryptographic Keys
S. Kanade
,
D. Camara
,
D. Petrovska-Delacrétaz
,
B. Dorizzi
2009
Corpus ID: 10561184
—In this paper, a two factor scheme is proposed to generate cryptographic keys directly from biometric data, which unlike…
Expand
2009
2009
An Extension of Differential Fault Analysis on AES
Wei Li
,
Dawu Gu
,
Yong Wang
,
Juanru Li
,
Zhiqiang Liu
Third International Conference on Network and…
2009
Corpus ID: 15606200
In CHES 2006, M. Amir et al. introduced a generalized method of differential fault attack (DFA) against AES–128. Their fault…
Expand
Review
2006
Review
2006
A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006
Emanuel Fonseca
,
Andreas Festag
2006
Corpus ID: 2198668
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide…
Expand
2005
2005
Identity-Based Encryption with Conventional Public-Key Infrastructure
J. Callas
2005
Corpus ID: 18386761
This paper proposes an identity-based encryption (IBE) scheme based on traditional public-key cryptographic systems, such as RSA…
Expand
2004
2004
Key Length
B. Schneier
2004
Corpus ID: 236325756
2001
2001
A known plaintext attack on the ISAAC keystream generator
M. Pudovkina
IACR Cryptology ePrint Archive
2001
Corpus ID: 9525613
Stream ciphers are often used in applications where high speed and low delay are a requirement. The ISAAC keystream generator is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE