[PDF][PDF] A survey on the cryptographic encryption algorithms

MF Mushtaq, S Jamel, AH Disina… - … Journal of Advanced …, 2017 - researchgate.net
Security is the major concern when the sensitive information is stored and transferred across
the internet where the information is no longer protected by physical boundaries …

Assessment of hybrid cryptographic algorithm for secure sharing of textual and pictorial content

P William, A Choubey, GS Chhabra… - … on electronics and …, 2022 - ieeexplore.ieee.org
Nowadays, networks have become global in scope, and information has assumed a digital
shape. Due to the volume of data transmitted over the internet, data security has become a …

Secure framework enhancing AES algorithm in cloud computing

IA Awan, M Shiraz, MU Hashmi… - Security and …, 2020 - Wiley Online Library
The tremendous growth of computational clouds has attracted and enabled intensive
computation on resource‐constrained client devices. Predominantly, smart mobiles are …

Rotation left digits to enhance the security level of message blocks cryptography

A Al-Hyari, K Aldebei, ZA Alqadi, B Al-Ahmad - IEEE Access, 2022 - ieeexplore.ieee.org
Due to the availability of several social media platforms and their use in sending text
messages, it is necessary to provide an easy and safe way to protect messages from being …

Secure and privacy-aware blockchain design: Requirements, challenges and solutions

S Aslam, A Tošić, M Mrissa - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
During the last decade, distributed ledger solutions such as blockchain have gained
significant attention due to their decentralized, immutable, and verifiable features. However …

A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing

P Singh, AK Pandey - International Journal of Data Informatics and …, 2022 - ijdiic.com
Cloud computing (CC) is among the most rapidly evolving computer technologies. That is
the required accessibility of network assets, mainly information storage with processing …

Data is the new oil–sort of: a view on why this comparison is misleading and its implications for modern data administration

C Stach - Future Internet, 2023 - mdpi.com
Currently, data are often referred to as the oil of the 21st century. This comparison is not only
used to express that the resource data are just as important for the fourth industrial …

A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish

H Dibas, KE Sabri - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Developing software applications that provide services in all business fields such as finance,
health, education, real estate and social media etc., must maintain various quality attributes …

Chaos-based joint speech encryption scheme using SHA-1

G Kaur, K Singh, HS Gill - Multimedia tools and applications, 2021 - Springer
In this paper, the speech signal is encrypted using multiple chaotic maps and cryptographic
protocols. The input signal is fragmented and scrambled into four segments using cubic …

Performance evaluation of RSA, ElGamal, and paillier partial homomorphic encryption algorithms

SJ Mohammed, DB Taha - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Information security has progressed dramatically over the past century because of the
significant advancements in computer and communications research. As a result, numerous …