[PDF][PDF] Cryptography: a comparative analysis for modern techniques

F Maqsood, M Ahmed, MM Ali… - International Journal of …, 2017 - pdfs.semanticscholar.org
Cryptography plays a vital role for ensuring secure communication between multiple entities.
In many contemporary studies, researchers contributed towards identifying best …

[PDF][PDF] Research on various cryptography techniques

Y Alemami, MA Mohamed, S Atiewi - International Journal of …, 2019 - researchgate.net
Security plays a critical position in preserving information privacy and secrecy. Many
encryption strategies are available to protect data during transmission or storage. These …

[PDF][PDF] A survey on the cryptographic encryption algorithms

MF Mushtaq, S Jamel, AH Disina… - … Journal of Advanced …, 2017 - researchgate.net
Security is the major concern when the sensitive information is stored and transferred across
the internet where the information is no longer protected by physical boundaries …

[PDF][PDF] DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis

J Thakur, N Kumar - International journal of emerging technology and …, 2011 - academia.edu
Security is the most challenging aspects in the internet and network applications. Internet
and networks applications are growing very fast, so the importance and the value of the …

Comparative analysis of cryptographic algorithms

Z Hercigonja - International Journal of Digital Technology & Economy, 2016 - hrcak.srce.hr
Sažetak Cyber security ensures a secure information exchange and enables communication
through the Internet. The data needs to be protected from unauthorized access and …

Performance analysis of encryption algorithms for security

M Panda - 2016 International Conference on Signal Processing …, 2016 - ieeexplore.ieee.org
With the fast progression of digital data exchange information security has become an
important issue in data communication. Encryption algorithms play an important role in …

[PDF][PDF] A survey on various cryptography techniques

VK Mitali, A Sharma - International Journal of Emerging Trends & …, 2014 - academia.edu
In modern era, evaluation of networking and wireless networks has come forward to grant
communication anywhere at any time. Security of wireless networks is main aspect and the …

[PDF][PDF] A comparative survey on symmetric key encryption techniques

M Agrawal, P Mishra - International journal on computer science and …, 2012 - Citeseer
Nowadays, the use of internet are growing increasingly across the world, security becomes
a prime concern of issue for the society. Earlier security was a major issue for military …

Symmetric algorithm survey: a comparative analysis

M Ebrahim, S Khan, UB Khalid - arXiv preprint arXiv:1405.0398, 2014 - arxiv.org
Information Security has become an important issue in modern world as the popularity and
infiltration of internet commerce and communication technologies has emerged, making …

A survey on conventional encryption algorithms of Cryptography

R Yegireddi, RK Kumar - … on ICT in Business Industry & …, 2016 - ieeexplore.ieee.org
This paper presents the results of a comprehensive interpretation to research some of the
most commonly used encryption algorithms in the domain of cryptography firstly to identify …