[PDF][PDF] Comparison of asymmetric algorithms in cryptography

N Garg, P Yadav - J. Comput. Sci. Mob. Comput.(IJCSMC), 2014 - academia.edu
In this paper we compare asymmetric algorithm like (RSA, Elliptic curve, OAEP) which is
used for security when data is transmitting over the network. These algorithms are based on …

[PDF][PDF] Review and analysis of cryptography techniques

N Jirwan, A Singh, S Vijay - International Journal of Scientific & …, 2013 - academia.edu
Today data communication mainly depends upon digital data communication, where prior
requirement is data security, so that data should reach to the intended user. So for providing …

[PDF][PDF] A comparative study of cryptographic algorithms

JS Chauhan, SK Sharma - Int. J. Innov. Res, 2015 - academia.edu
In the present Scenario, Secure data communication over network is essential and
Cryptography is the best way in current scenario to ensure secure data transmission over …

[PDF][PDF] A comparative study on the performance and the security of RSA and ECC algorithm

M Gobi, R Sridevi, R Rahini - International journal of advanced …, 2015 - researchgate.net
-------------------------------------------------------------------ABSTRACT-------------------------------------------
---------The information security has become one of the most significant problems in data …

[PDF][PDF] Analysis of cryptography techniques

RK Sheth, SP Patel - International Journal of Research in Advance …, 2015 - core.ac.uk
__________________________________… Abstract—Cryptography is a technique used
today hiding any confidential information from the attack of an intruder. Today data …

[PDF][PDF] Analysis of Cryptographic Techniques in Network Security

K Vanitha, K Anitha, AMJMZ Rahaman… - Journal of Applied …, 2018 - researchgate.net
Cryptography means secret writing. When the data are transferred from sender to receiver
over the network through information channel any third parties can intensively read and may …

[PDF][PDF] Study & analysis of cryptography algorithms: RSA, AES, DES, T-DES, blowfish

P Singh, S Kumar - Int. J. Eng. Technol, 2017 - researchgate.net
Cryptography is about protecting the data from third parties or from public to read
confidential data. Cryptography mainly focuses on encrypting the data or we can say …

A review and comparative analysis of various encryption algorithms

R Bhanot, R Hans - International Journal of Security and Its Applications, 2015 - earticle.net
Now days, Data security is very challenging issue that touches many areas including
computers and communication. Recently, we came across many attacks on cyber security …

[PDF][PDF] Data transmission using RSA algorithm

A Chavan, A Jadhav, S Kumbhar… - … Research Journal of …, 2019 - academia.edu
The confidential details transferred through the internet are hacked by phishing in an
electronic communication world. So information security plays an important role. The …

[PDF][PDF] A survey and performance analysis of various RSA based encryption techniques

S Khatarkar, R Kamble - International Journal of Computer Applications, 2015 - Citeseer
Network and Internet applications are growing very fast, since the need to secure these
applications are very fast. So the importance and the value of the swapped data by the …