-
1
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Article -
2
Iris template protection based on enhanced hill cipher
Published 2016“…Hill Cipher is a block cipher and symmetric key algorithm it has several advantages such as simplicity, high speed and high throughput can be used to protect Biometric Template. …”
Get full text
Conference or Workshop Item -
3
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Proceeding Paper -
4
Depth-optimized quantum circuits for ASCON: AEAD and HASH †
Published 2024“…As far as we know, this is the first implementation of a quantum circuit for the ASCON AEAD (Authenticated Encryption with Associated Data) scheme, which is a symmetric-key algorithm. Also, our quantum circuit implementation of the ASCON-HASH achieves a reduction of more than 88.9% in the Toffoli depth and more than 80.5% in the full depth compared to the previous work. …”
Get full text
Journal Article -
5
Classical and physical security of symmetric key cryptographic algorithms
Published 2021“…Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Attack. …”
Get full text
Thesis-Doctor of Philosophy