Now 82 visitors
Today:1120 Yesterday:1396
Total: 6127
245S 58P 14R
2025-11-08, Week 45 |
| TACT Journal Page |
| Call for Paper |
| Author Homepage |
| Paper Procedure |
| Paper Submission |
| Registration |
| Welcome Message |
| Statistics |
| Committee |
| Paper Archives |
| Outstanding Papers |
| Author Homepage |
| - Paper Procedure |
| - Journal Procedure |
| - Presentation Tips |
|
| Proceedings |
| Program with Papers |
| Plenary Session |
| Tutorial Session |
|
| Presentation Assistant |
| Hotel & Travel Info |
| About Korea |
| Accommodation |
| Transportation |
| VISA |
| Other Infomation |
|
| Photo Gallery |
| FAQ |
| Member Login |
| Scheduler Login |
| Seminar |
| Archives Login |
|
| Sponsors |

|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
IEEE/ICACT20220335 Question.5 Questioner: akmoon@etri.re.kr 2022-02-16 ¿ÀÀü 12:04:00 |
IEEE/ICACT20220335 Answer.5 Answer by Auhor matasemsaleh@gmail.com 2022-02-16 ¿ÀÀü 12:04:00
|
| What kind of encryption algorithms specifically did you choose from the python repository? |
I appreciate your interest in our research. Below are the encryption techniques we used in our research
The symmetric encryption techniques
AES, DES, 3DES, Fernet, Blowfish, ARC2, ARC4 , ChaCha, Salsa, RC5
Asymmetric
RSA, EMO-1, Schimedt-Samoa, Sphincs, BLS, Ed255192, ECDSA, Lamport
Lightweight encryption
Clefia, LEA, Present, Rabbit, Simon, Skinny, TEA, XTEA, XXTEA, Xtwine
|
Select Voice
| |