Dynamic Encryption

Authors

  • Lars R. Knudsen DTU Compute Technical University of Denmark

DOI:

https://doi.org/10.13052/jcsm2245-1439.341

Keywords:

This paper considers the concept of dynamic encryption1, which is about cryptosystems used for secrecy.

Abstract

This paper considers the concept of dynamic encryption1, which is about cryptosystems used for secrecy.

Downloads

Download data is not yet available.

References

ACM/SIGSAC. First acm workshop on moving target defense (mtd 2014). http:// csis.gmu.edu/MTD2014, November 2014.

Shimon Even and Oded Goldreich. On the power of cascade ciphers. In David Chaum, editor, CRYPTO, pages 43–50. Plenum Press, New York, 1983.

Otokar Grosek and Pavol Zajac. Searching for a different aes-class mixcolumns operation. In Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Tenerife, Canary Islands, Spain, pages 307–310, 2006.

Homeland Security. Moving traget defense. http://www.dhs.gov/science-and-technology/csd-mtd. Retrieved November 26, 2014.

Donald E. Knuth. The Art of Computer Programming, Volume II: Seminumerical Algorithms, 2nd Edition. Addison-Wesley, 1981.

Ueli M. Maurer and James L. Massey. Cascade ciphers: The importance of being first. J. Cryptology, 6(1):55–61, 1993.

A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.

National Institute of Standards and Technology. Advanced encryption standard. Federal Information Processing Standard (FIPS), Publication 197, U.S. Department of Commerce, Washington D. C., November 2001.

R. L. Rivest, 1996. Attributed to Rivest in Applied Cryptography by B. Schneier, Wiley, 1996.

Downloads

Published

2015-04-10

How to Cite

1.
Knudsen LR. Dynamic Encryption. JCSANDM [Internet]. 2015 Apr. 10 [cited 2024 Mar. 28];3(4):357-70. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6199

Issue

Section

Articles