[PDF][PDF] Comparative analysis of performance efficiency and security measures of some encryption algorithms

AL Jeeva, DV Palanisamy… - International Journal of …, 2012 - academia.edu
In wireless networks, the security of data is an important aspect and encryption algorithms
play an important role to provide the security to the wireless networks. The main aim of the …

Cryptography using blowfish algorithm

S Sharma, KN Patel, AS Jha - 2021 3rd International …, 2021 - ieeexplore.ieee.org
Security of data whether it is personal, professional or organizational from various attackers
in today's world has become a very tough task. One of the easiest ways to protect the data is …

Symmetric algorithm survey: a comparative analysis

M Ebrahim, S Khan, UB Khalid - arXiv preprint arXiv:1405.0398, 2014 - arxiv.org
Information Security has become an important issue in modern world as the popularity and
infiltration of internet commerce and communication technologies has emerged, making …

[PDF][PDF] A comparative analysis of symmetric algorithms in cloud computing: a survey

E Elgeldawi, M Mahrous, A Sayed - International Journal of …, 2019 - researchgate.net
Introducing Cloud computing to the globe has changed many conceptual and infrastructural
bases for today's and tomorrow's computing. It has made the global thinking migrates rapidly …

[PDF][PDF] Performance evaluation of symmetric encryption algorithms

HM Kader, MM Hadhoud - Performance Evaluation, 2009 - academia.edu
Internet and networks applications are growing very fast, so the needs to protect such
applications are increased. Encryption algorithms play a main role in information security …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

[PDF][PDF] Superiority of blowfish algorithm in wireless networks

G Singh, AK Singla, KS Sandha - International Journal of …, 2012 - researchgate.net
Encryption algorithm plays a crucial role in information security which guarantees the recent
growing internet and network applications. They are used to secure the data in wireless …

DES: The oldest symmetric block key encryption algorithm

M Sharma, RB Garg - 2016 International Conference System …, 2016 - ieeexplore.ieee.org
Cryptography is a part of Cryptology; which deals with reading, writing and breaking of code.
Cryptography is a technique used to camouflage the message into some unreadable text. It …

[PDF][PDF] Perbandingan Kecepatan Algoritma Kriptografi Asimetri

M Mulya - Journal of Research in Computer Science and …, 2013 - repository.unsri.ac.id
Nowadays the issue of data security has evolved into a staple in every organization.
Cryptographic is a common technique to secure the data. To determine which Cryptographic …

[PDF][PDF] A comparative study of some symmetric and asymmetric key cryptography algorithms

N Bisht, S Singh - International Journal of Innovative Research in Science …, 2015 - Citeseer
Data security is very important in wireless network and for this cryptography plays a crucial
role which means “secret writing”. In Cryptography encryption decryption of data is done by …