[PDF][PDF] Cryptography: a comparative analysis for modern techniques

F Maqsood, M Ahmed, MM Ali… - International Journal of …, 2017 - pdfs.semanticscholar.org
Cryptography plays a vital role for ensuring secure communication between multiple entities.
In many contemporary studies, researchers contributed towards identifying best …

[PDF][PDF] Analysis and comparison of symmetric key cryptographic algorithms based on various file features

R Masram, V Shahare, J Abraham… - International Journal of …, 2014 - academia.edu
For achieving faster communication most of confidential data is circulated through networks
as electronic data. Cryptographic ciphers have an important role for providing security to …

Comparative performance study on ordinary and chaos image encryption schemes

N Thein, HA Nugroho, TB Adji… - … conference on advanced …, 2017 - ieeexplore.ieee.org
The role of security becomes an essential issue since the rapid growth of numerous digital
communication and multimedia system. In many applications, image security requirement is …

Performance evaluation of advanced encryption standard algorithm

DF García - … Conference on Mathematics and Computers in …, 2015 - ieeexplore.ieee.org
Nowadays the confidentiality of information is an issue of primary importance. Generally,
confidentiality is obtained by encrypting/decrypting the information with a symmetric …

Plain text encryption using AES, DES and SALSA20 by java based bouncy castle API on Windows and Linux

M Panda, A Nag - … Conference on Advances in Computing and …, 2015 - ieeexplore.ieee.org
Information Security has become an important element of data communication. Various
encryption algorithms have been proposed and implemented as a solution and play an …

[PDF][PDF] Classification of efficient symmetric key cryptography algorithms

S Mewada, P Sharma, SS Gautam - International Journal of …, 2016 - academia.edu
Security threats have been a major concern as a result of emergence of technology in every
aspect including internet market, computational and communication technologies. To solve …

A single, triple chaotic cryptography using chaos in digital filter and its own comparison to DES and triple DES

R Pich, S Chivapreecha… - … International Workshop on …, 2018 - ieeexplore.ieee.org
The Data Encryption Standard (DES) of the multimedia cryptography possesses the weak
point of key conducting that is why it reaches to the triple form of DES. However, the triple …

[PDF][PDF] Encryption and decryption of text using AES algorithm

R Padate, A Patel - International Journal of Emerging Technology and …, 2014 - Citeseer
Data Security is primary concern for every communication system. There are many ways to
provide security to data that is being communicated. This Paper describes a design of …

[PDF][PDF] A novel semi-symmetric encryption algorithm for internet applications

N Fares, S Askar - Journal of University of Duhok, 2016 - researchgate.net
This paper proposes a novel encryption scheme to enhance the security level for computer
networks applications while maintaining the delay as small as possible. The proposed …

[PDF][PDF] Image encryption based on the novel 5D hyper-chaotic system via improved AES algorithm

SA Mehdi, KK Jabbar, FH Abbood - International Journal of Civil …, 2018 - researchgate.net
The extensive use of digital images in various areas, such as military, commercial and other,
requires that the security of images transmitted through communication networks and on the …