A review on various cryptographic techniques & algorithms

DK Sharma, NC Singh, DA Noola, AN Doss… - Materials Today …, 2022 - Elsevier
In current world security of the wired and remote organization is something essential.
Organization security is a significant part of data sharing. Many groundbreaking executions …

[PDF][PDF] Indonesian Journal of Computer Science

B Mardan, AM Abdulazeez - 2023 - pdfs.semanticscholar.org
Credit risk analysis is a critical process in the financial industry, as it helps lenders assess
the likelihood of borrowers defaulting on their loans. With the advent of machine learning …

[PDF][PDF] High Capacity data hiding using LSB Steganography and Encryption

SA Laskar, K Hemachandran - International Journal of Database …, 2012 - academia.edu
The network provides a method of communication to distribute information to the masses.
With the growth of data communication over computer network, the security of information …

Revamping Federated Learning Security from a Defender's Perspective: A Unified Defense with Homomorphic Encrypted Data Space

KN Kumar, R Mitra, CK Mohan - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
Federated Learning (FL) facilitates clients to collaborate on training a shared machine
learning model without exposing individual private data. Nonetheless FL remains …

[HTML][HTML] Medical image encryption: an application for improved padding based GGH encryption algorithm

M Sokouti, A Zakerolhosseini… - The open medical …, 2016 - ncbi.nlm.nih.gov
Medical images are regarded as important and sensitive data in the medical informatics
systems. For transferring medical images over an insecure network, developing a secure …

Analisa Algoritma Ciphers Transposition: Study Literature

JA Kusumaningtyas - Multimatrix, 2018 - jurnal.unw.ac.id
Technological developments allow the sending and storage of data can be done quickly,
easily, practically, and safely. One security used uses cryptographic techniques …

[PDF][PDF] Automated cryptanalysis of transposition ciphers using cuckoo search algorithm

M Heydari, MN Senejani - … Journal of Computer Science and Mobile …, 2014 - academia.edu
An approach of information security is Cryptography. Cryptanalysis is the science study to
break cryptography without the encryption key. The present paper shows the benefits of the …

Enhancing Security in Modern Transposition Ciphers Through Algorithmic Innovations and Advanced Cryptanalysis

A Armah, S Asare, E Abrefah-Mensah - The Indonesian Journal of Computer …, 2024 - ijcs.net
Columnar transposition ciphers have various vulnerabilities and limitations that render them
vulnerable to modern cryptographic threats and advanced cryptanalysis techniques. It is …

[PDF][PDF] AMathematicalProposed Model for Public Key Encryption Algorithm in Cybersecurity

HA Saif, GMI Gharib… - Advances in …, 2021 - research-publication.com
Information security is a very important science, especially after the continuous increase in
cybercrime of all kinds, which caused very large financial, economic and political losses, so …

Securing Private Key using New Transposition Cipher Technique

MGZ Fernando, AM Sison… - 2019 IEEE Eurasia …, 2019 - ieeexplore.ieee.org
The security of any public key cryptosystem depends on the private key thus, it is important
that only an authorized person can have access to the private key. The paper presents a …