Dynamic Encryption
DOI:
https://doi.org/10.13052/jcsm2245-1439.341Keywords:
This paper considers the concept of dynamic encryption1, which is about cryptosystems used for secrecy.Abstract
This paper considers the concept of dynamic encryption1, which is about cryptosystems used for secrecy.
Downloads
References
ACM/SIGSAC. First acm workshop on moving target defense (mtd 2014). http:// csis.gmu.edu/MTD2014, November 2014.
Shimon Even and Oded Goldreich. On the power of cascade ciphers. In David Chaum, editor, CRYPTO, pages 43–50. Plenum Press, New York, 1983.
Otokar Grosek and Pavol Zajac. Searching for a different aes-class mixcolumns operation. In Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Tenerife, Canary Islands, Spain, pages 307–310, 2006.
Homeland Security. Moving traget defense. http://www.dhs.gov/science-and-technology/csd-mtd. Retrieved November 26, 2014.
Donald E. Knuth. The Art of Computer Programming, Volume II: Seminumerical Algorithms, 2nd Edition. Addison-Wesley, 1981.
Ueli M. Maurer and James L. Massey. Cascade ciphers: The importance of being first. J. Cryptology, 6(1):55–61, 1993.
A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.
National Institute of Standards and Technology. Advanced encryption standard. Federal Information Processing Standard (FIPS), Publication 197, U.S. Department of Commerce, Washington D. C., November 2001.
R. L. Rivest, 1996. Attributed to Rivest in Applied Cryptography by B. Schneier, Wiley, 1996.