Background: There are large number of cryptographic algorithms available for ensuring data confidentiality and integrity in secure communication. Identification of the algorithm is a research activity that leads to better understanding of the weakness in its implementation, in order to make the algorithm more robust and secure. Description: The a...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp