[PDF][PDF] A survey on symmetric and asymmetric cryptography algorithms in information security

MA Al-Shabi - International Journal of Scientific and Research …, 2019 - researchgate.net
… important cryptography algorithms appearing until now. These cryptographic algorithms are
… in enhancing the performance of the current cryptographic methods. The result shows the …

[PDF][PDF] Comparing Symmetric and Asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms

RB Marqas, SM Almufti, RR Ihsan - … /Journal of Xi'an University of …, 2020 - researchgate.net
… Figure 2: Cryptography Categories [5] This paper compared the RSA algorithm as a sample
for Asymmetric cryptography with AES algorithm as a sample for Symmetric cryptography. …

[PDF][PDF] Comparative study of cryptography algorithms and its' applications

MNB Anwar, M Hasan, MM Hasan, JZ Loren… - International Journal of …, 2019 - academia.edu
… of the symmetric and/or asymmetric algorithms varies greatly depending on different … analysis
of the different algorithms for both symmetric and asymmetric cryptography based on their …

A hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography algorithms

H Abroshan - … Journal of Advanced Computer Science and …, 2021 - search.proquest.com
… -curve-based asymmetric cryptography algorithm to secure the … The elliptic-curve-based
cryptography algorithms have a … One of the benefits of this encryption is cryptography over finite …

Cryptographic encoding in modern symmetric and asymmetric encryption

V Rudnytskyi, O Korchenko, N Lada, R Ziubina… - Procedia Computer …, 2022 - Elsevier
… of symmetric and asymmetric cryptographic algorithms was carried out. In … crypto algorithms
by the transformation quality. The 5th section is devoted to the conflict between the crypto

A comparative review on symmetric and asymmetric DNA-based cryptography

BT Hammad, AM Sagheer, IT Ahmed, N Jamil - Bulletin of Electrical …, 2020 - beei.org
… This paper combined between the use of symmetric and asymmetric cryptography, the
purpose from this combination is to see the effect of DNA coding on the cryptography algorithm. …

Research trends review on RSA scheme of asymmetric cryptography techniques

MSA Mohamad, R Din, JI Ahmad - Bulletin of Electrical Engineering and …, 2021 - beei.org
… the cryptography classifications is asymmetric cryptography, … of RSA scheme of asymmetric
cryptography techniques. It is … cryptography algorithms based on the technique used. The …

[PDF][PDF] Performance comparison of asymmetric cryptography (case study-mail message)

Z Sann, T Soe, K Knin, Z Win - APTIKOM Journal on …, 2019 - pdfs.semanticscholar.org
algorithm and ElGamal algorithm are asymmetric algorithms … where RSA algorithm is faster
than ElGamal algorithm. 1) … is the time needed for an algorithm to do encryption and produce …

Data security system for a bank based on two different asymmetric algorithms cryptography

M Ashiqul Islam, AA Kobita, M Sagar Hossen… - … Computing and Mobile …, 2021 - Springer
… Public-Key Cryptography (PKC) Public-key cryptography or Asymmetric cryptography is
the … This paper includes two popular asymmetric algorithms RSA (Rivest–Shamir–Adleman), …

An analysis of leading lattice-based asymmetric cryptographic primitives

C Easttom - 2019 IEEE 9th Annual Computing and …, 2019 - ieeexplore.ieee.org
asymmetric cryptography, those bases are problems in number theory. Lattice based
mathematical problems provide a basis for cryptographic algorithms… , asymmetric cryptography is …