메뉴 건너뛰기




Volumn 10, Issue 3, 2010, Pages 213-219

Evaluating the performance of symmetric encryption algorithms

Author keywords

3DES; AES; Blowfish; Computer security; DES; Encryption techniques; RC2; RC6

Indexed keywords

3DES; AES; BLOWFISH; DES; ENCRYPTION TECHNIQUE; RC2; RC6;

EID: 84875361430     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (188)

References (20)
  • 2
    • 0028428941 scopus 로고
    • The data encryption standard (DES) and its strength against attacks
    • May
    • D. Coppersmith,"The data encryption standard (DES) and its strength against attacks," IBM Journal of Research and Development, pp. 243-250, May 1994.
    • (1994) IBM Journal of Research and Development , pp. 243-250
    • Coppersmith, D.1
  • 3
    • 0013017020 scopus 로고    scopus 로고
    • Rijndael: The advanced encryption standard
    • Mar
    • J. Daemen, and V. Rijmen,"Rijndael: The advanced encryption standard," Dr. Dobb's Journal, pp. 137-139, Mar. 2001.
    • (2001) Dr. Dobb's Journal , pp. 137-139
    • Daemen, J.1    Rijmen, V.2
  • 4
    • 80054068473 scopus 로고    scopus 로고
    • Central manager: A solution to avoid denial of service attacks for wreless LANs
    • P. Ding,"Central manager: A solution to avoid denial of service attacks for wreless LANs," International Journal of Network Security, vol. 4, no. 1, pp. 35-44, 2007.
    • (2007) International Journal of Network Security , vol.4 , Issue.1 , pp. 35-44
    • Ding, P.1
  • 5
    • 62749096566 scopus 로고    scopus 로고
    • Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms
    • Nov
    • N. E. Fishawy,"Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms," International Journal of Network Security, pp. 241-251, Nov. 2007.
    • (2007) International Journal of Network Security , pp. 241-251
    • Fishawy, N.E.1
  • 6
    • 84875332889 scopus 로고    scopus 로고
    • Security In Wireless LANS And MANS
    • Hardjono
    • Hardjono, Security In Wireless LANS And MANS, Artech House Publishers, 2005.
    • (2005) Artech House Publishers
  • 7
    • 4544219570 scopus 로고    scopus 로고
    • Energy Consumption of Encryption Schemes in Wireless Devices Thesis
    • Apr. 9, Retrieved Oct. 1
    • S. Hirani, Energy Consumption of Encryption Schemes in Wireless Devices Thesis, University of Pittsburgh, Apr. 9,2003, Retrieved Oct. 1, 2008. (http://portal.acm.org/citation.cfm?id=383768)
    • (2003) University of Pittsburgh
    • Hirani, S.1
  • 8
    • 33646261491 scopus 로고    scopus 로고
    • Authenticated encryption schemes: current status and key issues
    • M. S. Hwang and C. Y. Liu,"Authenticated encryption schemes: current status and key issues," International Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005.
    • (2005) International Journal of Network Security , vol.1 , Issue.2 , pp. 61-73
    • Hwang, M.S.1    Liu, C.Y.2
  • 9
    • 69749086390 scopus 로고    scopus 로고
    • A method for obtaining deniable publickey encryption
    • M. H. Ibrahim,"A method for obtaining deniable publickey encryption," International Journal of Network Security, vol. 8, no. 1, pp. 1-9, 2009.
    • (2009) International Journal of Network Security , vol.8 , Issue.1 , pp. 1-9
    • Ibrahim, M.H.1
  • 10
    • 69749087308 scopus 로고    scopus 로고
    • Receiverdeniable publickey encryption
    • M. H. Ibrahim,"Receiverdeniable publickey encryption," International Journal of Network Security, vol. 8, no. 2, pp. 159-165, 2009.
    • (2009) International Journal of Network Security , vol.8 , Issue.2 , pp. 159-165
    • Ibrahim, M.H.1
  • 12
    • 77953153793 scopus 로고    scopus 로고
    • Tradeoffs between Energy and Security in Wireless Networks Thesis
    • Apr
    • K. McKay, Tradeoffs between Energy and Security in Wireless Networks Thesis, Worcester Polytechnic Institute, Apr. 2005.
    • (2005) Worcester Polytechnic Institute
    • McKay, K.1
  • 13
    • 0035360456 scopus 로고    scopus 로고
    • Software implementation strategies for powerconscious systems
    • K. Naik,"Software implementation strategies for powerconscious systems," Mobile Networks and Applications, vol. 6, pp. 291-305, 2001.
    • (2001) Mobile Networks and Applications , vol.6 , pp. 291-305
    • Naik, K.1
  • 17
    • 0003902428 scopus 로고    scopus 로고
    • Cryptography and Network Security
    • Prentice Hall, 4th Ed
    • W. Stallings, Cryptography and Network Security, Prentice Hall, pp. 58-309, 4th Ed, 2005.
    • (2005) , pp. 58-309
    • Stallings, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.