[PDF][PDF] Cognitive analytics and comparison of symmetric and asymmetric cryptography algorithms

DP Joseph, M Krishna, K Arun - Int. J. Adv. Res. Comput. Sci, 2015 - researchgate.net
Today is the era of Internet and networks applications. So the Information Security has been
very important issue in data communication. Any loss to information can prove to be great …

Analysis of key based cryptographic algorithms and its applications

NKS Keerthan, SP Marri… - 2023 IEEE 3rd International …, 2023 - ieeexplore.ieee.org
Information security is the process of safeguarding data. It safeguards its availability, privacy,
and integrity. The capacity to secure data from attacks, as well as efficiency and speed are …

[PDF][PDF] Analysis of network data Encryption & Decryption techniques in communication systems

CJ Ezeofor, AG Ulasi - … Journal of Innovative Research in Science …, 2014 - researchgate.net
This paper presents analysis of network data encryption and decryption techniques used in
communication systems. In network communication systems, exchange of information mostly …

[PDF][PDF] A study on symmetric and asymmetric key encryption algorithms

S Suguna, V Dhanakoti, R Manjupriya - Int Res J Eng Technol (IRJET …, 2016 - academia.edu
Security plays a major role in internet and network application. Nowadays, internet and
network application are emerging very rapidly. Today, the significant and the worth of the …

[PDF][PDF] A Comparative Study of Cryptographic Algorithms A Comparative Study of Cryptographic Algorithms

MH Dar, P Mittal, V Kumar - IJCSN International Journal of Computer …, 2014 - academia.edu
Cryptography is the art and science of keeping massages secure. It is the study of
techniques related to aspects of information security such as information privacy, integrity …

Survey of applications, advantages, and comparisons of AES encryption algorithm with other standards

BL Ananya, V Nikhitha, S Arjun… - International Journal of …, 2023 - milestoneresearch.in
Nowadays data sharing over the internet is a major and critical issue due to security
problems. So more security mechanisms are required to protect the data while sharing …

[PDF][PDF] Research on various cryptography techniques

Y Alemami, MA Mohamed, S Atiewi - International Journal of …, 2019 - researchgate.net
Security plays a critical position in preserving information privacy and secrecy. Many
encryption strategies are available to protect data during transmission or storage. These …

Overview and Performance Analysis of Encryption Algorithms

ZC Oleiwi, WA Alawsi, WC Alisawi… - Journal of physics …, 2020 - iopscience.iop.org
Data protection is a complex problem affecting many areas including computers and
communications. To ensure the necessary protection of applications, cryptographic methods …

[PDF][PDF] A survey on cryptography algorithms

OG Abood, SK Guirguis - International Journal of Scientific and …, 2018 - academia.edu
DOI: 10.29322/IJSRP. 8.7. 2018. p7978 http://dx. doi. org/10.29322/IJSRP. 8.7. 2018. p7978
Abstract-With the major advancements in the field of technology and electronics, one …

[PDF][PDF] A comparative study of some symmetric and asymmetric key cryptography algorithms

N Bisht, S Singh - International Journal of Innovative Research in Science …, 2015 - Citeseer
Data security is very important in wireless network and for this cryptography plays a crucial
role which means “secret writing”. In Cryptography encryption decryption of data is done by …