USING DETERMINISTIC GENETIC ALGORITHM TO PROVIDE SECURED CRYPTOSYSTEMThis paper gives an example of applying deterministic genetic algorithm in
symmetric encryption
Public key cryptosystems and their application in digital signature algorithms they are implemented. It compares
symmetric and asymmetric signature methods, describes the use of open
key digital
SIBCiphers - symmetric iterative block ciphers with functional keysSIBCiphers -
symmetric iterative block ciphers with functional
keys Overview and Performance Analysis of Encryption Algorithms with
symmetric and asymmetric
keys is presented. Factors ensuring the achievement of efficiency, flexibility
NEARLY SYMMETRICAL AND ANTI-SYMMETRICAL SPACES WITH AFFINE CONNECTIONNEARLY
SYMMETRICAL AND ANTI-
SYMMETRICAL SPACES WITH AFFINE CONNECTION
Authenticated encryption mode with blocks skippingBlock
symmetric ciphers are one of the most important components of modern information security