Skip to main content

Showing 1–2 of 2 results for author: Suneetha, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:1202.1898  [pdf

    cs.CR

    A Block Cipher using Rotation and Logical XOR Operations

    Authors: D. Sravana Kumar, CH. Suneetha, A. Chandrasekhar

    Abstract: Cryptography is the study of methods of sending messages in disguised form so that only the intended recipients can remove the disguise and read the messages. Information security has become a very critical aspect of modern communication systems. With the global acceptance of the Internet as a medium of communication, virtually every computer in the world is connected to every other. It has create… ▽ More

    Submitted 9 February, 2012; originally announced February 2012.

    Journal ref: International Journal of Computer Science Issues, Vol.8, Issue.6, No.1, November 2011

  2. Encryption of Data using Elliptic Curve over Finite fields

    Authors: D. Sravana Kumar, CH. Suneetha, A. Chandrasekhar

    Abstract: Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. Public-key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography (ECC) schemes including key exchange, encryption and digital signature. The principal attraction of elliptic c… ▽ More

    Submitted 9 February, 2012; originally announced February 2012.

    Journal ref: International Journal of Distributed and Parallel Sysstems(IJDPS) Vol.3 No.1 January 2012