Now 230 visitors
Today:634 Yesterday:1504
Total: 859
401S 106P 78R
2025-12-25, Week 52 |
| Member Login |
| Welcome Message |
| Statistics |
| Committee |
| TACT Journal Homepage |
| Call for Paper |
| Paper Submission |
| Find My Paper |
| Author Homepage |
| Paper Procedure |
| FAQ |
| Registration / Invoice |
| Paper Archives |
| Outstanding Papers |
| Author Homepage |
| - Paper Procedure |
| - Journal Procedure |
| - Presentation Tips |
|
| Proceedings |
| Program with Papers |
| Plenary Session |
| Tutorial Session |
|
| Presentation Assistant |
| Hotel & Travel Info |
| About Korea |
| Accommodation |
| Transportation |
| VISA |
| Other Infomation |
|
| Photo Gallery |
| Scheduler Login |
| Seminar |
| Archives Login |
|
| Sponsors |

|

|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
IEEE/ICACT20220335 Question.5 Questioner: akmoon@etri.re.kr 2022-02-16 ¿ÀÀü 12:04:00 |
IEEE/ICACT20220335 Answer.5 Answer by Auhor matasemsaleh@gmail.com 2022-02-16 ¿ÀÀü 12:04:00
|
| What kind of encryption algorithms specifically did you choose from the python repository? |
I appreciate your interest in our research. Below are the encryption techniques we used in our research
The symmetric encryption techniques
AES, DES, 3DES, Fernet, Blowfish, ARC2, ARC4 , ChaCha, Salsa, RC5
Asymmetric
RSA, EMO-1, Schimedt-Samoa, Sphincs, BLS, Ed255192, ECDSA, Lamport
Lightweight encryption
Clefia, LEA, Present, Rabbit, Simon, Skinny, TEA, XTEA, XXTEA, Xtwine
|
Select Voice
| |