A review paper on cryptography

AM Qadir, N Varol - … on digital forensics and security (ISDFS), 2019 - ieeexplore.ieee.org
With the internet having reached a level that merges with our lives, growing explosively
during the last several decades, data security has become a main concern for anyone …

A review in recent development of network threats and security measures

R Dastres, M Soori - International Journal of Information Sciences and …, 2021 - hal.science
Networks are vulnerable devices due to their basic feature of facilitating remote access and
data communication. The information in the networks needs to be kept secured and safe in …

[PDF][PDF] NETWORK THREATS, ATTACKS AND SECURITY MEASURES: A REVIEW.

R Khan, M Hasan - International Journal of Advanced …, 2017 - pdfs.semanticscholar.org
Network security has become vital for securing sensitive and confidential information of
organizations which is being shared and transferred across global networks. Various studies …

Ion conduction in chitosan-starch blend based polymer electrolyte with ammonium thiocyanate as charge provider

AS Mohamed, MF Shukur, MFZ Kadir… - Journal of Polymer …, 2020 - Springer
The global issue of environmental pollution has become the motivation for researchers to
develop natural based products. Researchers start to substitute synthetic polymers with …

[PDF][PDF] Analyzing the data of software security life-span: quantum computing era

H Alyami, M Nadeem, W Alosaimi, A Alharbi… - … Automation & Soft …, 2022 - academia.edu
Software or web application security is the main objective in the era of Information
Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial …

Chaotic switching for quantum coin Parrondo's games with application to encryption

JW Lai, KH Cheong - Physical Review Research, 2021 - APS
Quantum game theory has stimulated some interest in recent years with the advancement of
quantum information theory. This interest has led to a resurgence of quantum Parrondo's …

[PDF][PDF] An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.

M Nadeem, A Arshad, S Riaz, SW Zahra… - … , Materials & Continua, 2023 - researchgate.net
Many symmetric and asymmetric encryption algorithms have been developed in cloud
computing to transmit data in a secure form. Cloud cryptography is a data encryption …

Cryptanalysis the SHA-256 hash function using rainbow tables

O Manankova, M Yakubova… - Indonesian Journal of …, 2022 - section.iaesonline.com
The research of the strength of a hashed message is of great importance in modern
authentication systems. The hashing process is inextricably linked with the password …

[PDF][PDF] Theoretical Background of Cryptography

RM Al-Amri, DN Hamood, AK Farhan - Mesopotamian Journal of …, 2023 - iasj.net
Cryptography is the practice of secure communication and the study of secure
communication techniques. The theoretical foundations of cryptography include concepts …

[PDF][PDF] Performance analysis of encryption and decryption algorithm

S Pronika, S Tyagi - Indonesian Journal of Electrical …, 2021 - pdfs.semanticscholar.org
In this tumultuous 21st century, we are surrounding by lots of applications such as social
media websites all over the internet or this era can also define as digital era in which …