Encryption of images file using a user controlled automatically-generated key
Traditional symmetrical cryptographic algorithms generally provide an adequate degree of immunity to attacks aimed at revealing secret keys. A number of approaches exist for the automated generation of secret keys, but, for high security applications, some end users remain wary of approaches that ar...
Saved in:
Main Authors: | , |
---|---|
Format: | Default Conference proceeding |
Published: |
2018
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/37961 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|