ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
Dynamic Encryption
PDF
HTML

Keywords

This paper considers the concept of dynamic encryption1, which is about cryptosystems used for secrecy.

How to Cite

[1]
L. R. . Knudsen, “Dynamic Encryption”, JCSANDM, vol. 3, no. 4, pp. 357–370, Apr. 2015.

Abstract

This paper considers the concept of dynamic encryption1, which is about cryptosystems used for secrecy.

https://doi.org/10.13052/jcsm2245-1439.341
PDF
HTML

References

ACM/SIGSAC. First acm workshop on moving target defense (mtd 2014). http:// csis.gmu.edu/MTD2014, November 2014.

Shimon Even and Oded Goldreich. On the power of cascade ciphers. In David Chaum, editor, CRYPTO, pages 43–50. Plenum Press, New York, 1983.

Otokar Grosek and Pavol Zajac. Searching for a different aes-class mixcolumns operation. In Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Tenerife, Canary Islands, Spain, pages 307–310, 2006.

Homeland Security. Moving traget defense. http://www.dhs.gov/science-and-technology/csd-mtd. Retrieved November 26, 2014.

Donald E. Knuth. The Art of Computer Programming, Volume II: Seminumerical Algorithms, 2nd Edition. Addison-Wesley, 1981.

Ueli M. Maurer and James L. Massey. Cascade ciphers: The importance of being first. J. Cryptology, 6(1):55–61, 1993.

A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.

National Institute of Standards and Technology. Advanced encryption standard. Federal Information Processing Standard (FIPS), Publication 197, U.S. Department of Commerce, Washington D. C., November 2001.

R. L. Rivest, 1996. Attributed to Rivest in Applied Cryptography by B. Schneier, Wiley, 1996.

Downloads

Download data is not yet available.