Now 49 visitors
Today:333 Yesterday:608
Total: 32840
13S 3P 0R
2025-07-07, Week 28 |
TACT Journal Page |
Call for Paper |
Author Page |
Paper Procedure |
Paper Submission |
Registration |
Welcome Message |
Statistics |
Committee |
Paper Archives |
Outstanding Papers |
Author Page |
- Paper Procedure |
- Journal Procedure |
- Presentation Tips |
|
Proceedings |
Program with Papers |
Plenary Session |
Tutorial Session |
|
Presentation Assistant |
Hotel & Travel Info |
About Korea |
Accommodation |
Transportation |
VISA |
Other Infomation |
|
Photo Gallery |
FAQ |
Member Login |
Scheduler Login |
Seminar |
Archives Login |
|
Sponsors |

|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
IEEE/ICACT20220335 Question.5 Questioner: akmoon@etri.re.kr 2022-02-16 ¿ÀÀü 12:04:00 |
IEEE/ICACT20220335 Answer.5 Answer by Auhor matasemsaleh@gmail.com 2022-02-16 ¿ÀÀü 12:04:00
|
What kind of encryption algorithms specifically did you choose from the python repository? |
I appreciate your interest in our research. Below are the encryption techniques we used in our research
The symmetric encryption techniques
AES, DES, 3DES, Fernet, Blowfish, ARC2, ARC4 , ChaCha, Salsa, RC5
Asymmetric
RSA, EMO-1, Schimedt-Samoa, Sphincs, BLS, Ed255192, ECDSA, Lamport
Lightweight encryption
Clefia, LEA, Present, Rabbit, Simon, Skinny, TEA, XTEA, XXTEA, Xtwine
|
Select Voice
| |