[引用][C] A comprehensive comparison of symmetric cryptographic algorithms by using multiple types of parameters

M Usman, IA Shoukat… - International …, 2018 - … OFFICE 301, SANGDO 5 DONG 509 …

Pentaplicative Cipher Technique

N Garg, H Bhatia, R Johari - … : Proceedings of ICICC 2018, Volume 1, 2019 - Springer
The traditional cipher techniques employ the use of limited keys for asymmetric and
symmetric cryptography. Most of the encoding schemes use single key function to encrypt …

[PDF][PDF] Classification of efficient symmetric key cryptography algorithms

S Mewada, P Sharma, SS Gautam - International Journal of …, 2016 - academia.edu
Security threats have been a major concern as a result of emergence of technology in every
aspect including internet market, computational and communication technologies. To solve …

[PDF][PDF] A review on various most common symmetric encryptions algorithms

SKPPKC Dave - IDEA, 2013 - academia.edu
Security is the most challenging aspects in the internet and network application. Internet and
networks applications are growing very fast, so the importance and the value of the …

Performance study of some symmetric block cipher algorithms under Linux operating system

NA Kofahi, T Al-Somani, K Al-Zamil - Journal of Discrete …, 2004 - Taylor & Francis
In this research work, implementation of three symmetric, block encryption algorithms
namely: DES, Triple-DES and Blowfish under Linux platform is presented. A comparison is …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

A design pattern for symmetric encryption

Y Bharadwaj, S Chakraverty - 2013 International Conference …, 2013 - ieeexplore.ieee.org
Symmetric encryption is widely used to enforce data security and provide other
cryptographic primitives. Despite significant research that has led to the development of …

[引用][C] UR5: A Novel Symmetrical Encryption Algorithm With Fast Flexible and High Security Based On Key Updation

G Ramesh, R Umarani - European Journal of Scientific Research ISSN, 2012

Performance evaluation and analysis of advanced symmetric key cryptographic algorithms for cloud computing security

AR Wani, QP Rana, N Pandey - Soft Computing: Theories and …, 2019 - Springer
Cloud computing environment is adopted by a large number of organizations, so the rapid
transition toward the cloud has fueled concerns on security perspective. Encryption …

[PDF][PDF] An experimental study on performance evaluation of asymmetric encryption algorithms

S Farah, Y Javed, A Shamim… - Recent Advances in …, 2012 - researchgate.net
This paper presents the evaluation of RSA, ElGamal & Pallier asymmetric encryption
algorithms. Encryption algorithms provide a secure communication over the internet and …