A Review of Information Security using Cryptography Technique.

N Sharma - … Journal of Advanced Research in Computer …, 2017 - search.ebscohost.com
Data security has become crucial aspect nowadays in every sectors. So in order to protect it
various methods and algorithm have been implemented. It protects its availability, privacy …

[PDF][PDF] Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication

S Koko, A Babiker - IOSR Journal of Computer Engineering (IOSR …, 2015 - academia.edu
Information security is the process of protecting information. It protects its availability, privacy
and integrity. Access to stored information on computer databases has increased greatly …

[PDF][PDF] A comparative study of some symmetric and asymmetric key cryptography algorithms

N Bisht, S Singh - International Journal of Innovative Research in Science …, 2015 - Citeseer
Data security is very important in wireless network and for this cryptography plays a crucial
role which means “secret writing”. In Cryptography encryption decryption of data is done by …

[PDF][PDF] Performance analysis of symmetric key cryptography algorithms: DES, AES and BLOWFISH

N Kumar, J Thakur, A Kalia - An International Journal of Engineering …, 2011 - Citeseer
Security is the most challenging aspects in the internet and network applications.
Cryptography is the one of the main categories of computer security that converts …

[PDF][PDF] A study on symmetric and asymmetric key encryption algorithms

S Suguna, V Dhanakoti, R Manjupriya - Int Res J Eng Technol (IRJET …, 2016 - academia.edu
Security plays a major role in internet and network application. Nowadays, internet and
network application are emerging very rapidly. Today, the significant and the worth of the …

[PDF][PDF] A survey on advanced encryption standard

SK Rao, D Mahto, DA Khan - International Journal of Science and …, 2017 - researchgate.net
Rijndael's Advanced Encryption Standard (AES) is the block cipher based symmetric-key
cryptography to protect the sensitive information. The key sizes of AES are 128, 192, 256 …

[PDF][PDF] Study on cryptography and techniques

S Sharma, Y Gupta - International Journal of Scientific Research in …, 2017 - academia.edu
In today's information age, communication play a very important role which help in growth of
new technologies. So security is an essential parameter to be considered. A mechanism is …

Comparative analysis of cryptographic algorithms

Z Hercigonja - International Journal of Digital Technology & Economy, 2016 - hrcak.srce.hr
Sažetak Cyber security ensures a secure information exchange and enables communication
through the Internet. The data needs to be protected from unauthorized access and …

[引用][C] Performance and efficiency analysis of different block cipher algorithms of symmetric key cryptography

MI Alam, MR Khan - International Journal of Advanced Research in …, 2013

[引用][C] Comparative analysis on different parameters of encryption algorithms for information security

MA Mushtaque - International journal of computer sciences and …, 2014