Scroll to Top

Volume : XIV, Issue : II, March - 2024

OPTIMIZATION STRATEGIES FOR SECURE KEY GENERATION IN CRYPTOSYSTEMS

Shankrappa S/O Sidram, Dr. M. K. Gupta

By : Laxmi Book Publication

Abstract :

This study investigates optimization strategies for secure key generation in cryptosystems, focusing on enhancing security, efficiency, and robustness against potential attacks. Key generation is a critical component of cryptographic systems, as the strength of the cryptosystem heavily depends on the unpredictability and quality of the keys.

Keywords :


Article :


Cite This Article :

Shankrappa S/O Sidram, Dr. M. K. Gupta(2024). OPTIMIZATION STRATEGIES FOR SECURE KEY GENERATION IN CRYPTOSYSTEMS. Indian Streams Research Journal, Vol. XIV, Issue. II, http://isrj.org/UploadedData/11661.pdf

References :

  1. Menezes, A., van Oorschot, P., & Vanstone, S. (1996). Handbook of Applied Cryptography.
  2. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson.

Article Post Production

    No data exists for the row/column.
Creative Commons License
Indian Streams Research Journal by Laxmi Book Publication is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at http://oldisrj.lbp.world/Default.aspx.
Permissions beyond the scope of this license may be available at http://oldisrj.lbp.world/Default.aspx
Copyright � 2014 Indian Streams Research Journal. All rights reserved
Looking for information? Browse our FAQs, tour our sitemap, or contact ISRJ
Read our Privacy Policy Statement and Plagairism Policy. Use of this site signifies your agreement to the Terms of Use