Cryptography Algorithms: a review

A Gupta, NK Walia - … Journal of Engineering Development and Research, 2014 - rjwave.org
Cryptography is derived from Greek word 'crypto'means secret 'graphy'means writing that is
used to conceal the content of message from all except the sender and the receiver and is …

A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish

H Dibas, KE Sabri - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Developing software applications that provide services in all business fields such as finance,
health, education, real estate and social media etc., must maintain various quality attributes …

A new symmetric key encryption algorithm with higher performance

A Murtaza, SJH Pirzada… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
In this era of information technology, information security is a major concern. To address the
challenges of data security, cryptography is used for storage as well as for the …

A comparative analysis of hybrid encryption technique for images in the cloud environment

P Kulkarni, R Khanai, G Bindagi - … International conference on …, 2020 - ieeexplore.ieee.org
Cloud heralds a new era of computing. Cloud provides flexible, cost effective service. Cloud
service is also referred as “On Demand Service” or “Pay as you go Service”. Mobile cloud …

VLSI design of energy efficient computational centric smart objects for IoT

CR Kumar, A Ibrahim - 2018 15th Learning and Technology …, 2018 - ieeexplore.ieee.org
Traditional standalone embedded system and its computational elements firmly connect with
physical entities such as Input-Output devices and sensor networks in IoT applications such …

[PDF][PDF] A critical analysis of some symmetric key block cipher algorithms

S Mankotia, M Sood - International Journal of Computer Science and …, 2015 - academia.edu
In this era of information technology and e-commerce security is the key aspect while
transmitting confidential information over insecure network like internet. In order to protect …

[PDF][PDF] Cryptography Algorithms: A Review

AGNK Walia - International Journal of Engineering Development and …, 2014 - Citeseer
Cryptography is derived from Greek word 'crypto'means secret 'graphy'means writing that is
used to conceal the content of message from all except the sender and the receiver and is …

Parallel-pipelined-memory-based blowfish design with reduced FPGA utilization for secure ZigBee real-time transmission

R Ahmad, D Kho, A Abd. Manaf, W Ismail - Wireless Personal …, 2019 - Springer
Data security is currently become a serious concern in wireless communication system for
both the users and providers. Without a secure medium, the data transmission is exposed to …

Implementation of a high-performance blowfish for secure wireless communication

R Ahmad, AA Manaf, W Ismail - Journal of Telecommunication …, 2016 - jtec.utem.edu.my
Security has become an important concern in wireless communication systems both for the
users and the providers. Without a secure medium, users can have their transmissions …

Development of an improved power-throughput Blowfish algorithm on FPGA

R Ahmad¹, AA Manaf, W Ismail - 2016 IEEE 12th International …, 2016 - ieeexplore.ieee.org
It is well-known that advanced encryption standard (AES) algorithm is used for protection
against various classes of wireless attacks in wireless communication standard such as …