[HTML][HTML] Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing

F Thabit, S Alhomdy, S Jagtap - Global Transitions Proceedings, 2021 - Elsevier
Nowadays, cloud computing is rapid growth in the IT industry, which provides a new way to
manage the different information systems. The rapid development of technology makes it …

[PDF][PDF] Advanced approach for encryption using advanced encryption standard with chaotic map

Y Alemami, MA Mohamed, S Atiewi - Int. J. Electr. Comput. Eng, 2023 - researchgate.net
At present, security is significant for individuals and organizations. All information need
security to prevent theft, leakage, alteration. Security must be guaranteed by applying some …

[PDF][PDF] An extensive review on IoT security challenges and LWC implementation on tiny hardware for node level security evaluation

S Sutar, P Mekala - International Journal of Next-Generation …, 2022 - researchgate.net
Internet-of-Things (IoT) offers a novel intelligent ecosystem that consists of various physical
objects interconnected via the internet, which draws the attention of researchers …

An experimental comparison of chaotic and non-chaotic image encryption schemes

J Ahmad, SO Hwang, A Ali - Wireless Personal Communications, 2015 - Springer
During last few years, transmission of digital multimedia data (images, audios and videos)
over Internet, wireless cell phones, television broadcasting etc., has been significantly …

[PDF][PDF] Cryptography: Avalanche effect of AES and RSA

R Verma, AK Sharma - International Journal of Scientific and …, 2020 - academia.edu
Security is a major concern in the field of computer science. With the advancement in
technology security of data from theft has become a major obstacle. It is necessary to encrypt …

An analysis and a comparative study of cryptographic algorithms used on the Internet of Things (IoT) based on avalanche effect

KD Muthavhine… - … Conference on Information …, 2018 - ieeexplore.ieee.org
The world is already on the way of connecting everything (objects) to the internet, from
refrigerators to sprinkler systems. This interconnection of objects to the internet is new …

Implementasi enkripsi data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada proses pengamanan kata sandi sistem penjadwalan …

S Sulastri, RDM Putri - Jurnal Teknik Elektro, 2018 - journal.unnes.ac.id
Terdapat berbagai macam jenis enkripsi yang dapat digunakan, misalnya MD5 dan SHA-
256. Namun penggunaan MD5 saja atau SHA-256 saja tidak cukup aman karena dapat …

Chaotic rivest-shamir-adlerman algorithm with data encryption standard scheduling

ER Arboleda, JL Balaba, JCL Espineli - Bulletin of Electrical Engineering …, 2017 - beei.org
Cryptography, which involves the use of a cipher, describes a process of encrypting
information so that its meaning is hidden and thus, secured from those who do not know how …

Security analysis of secure force algorithm for wireless sensor networks

S Khan, MS Ibrahim, KA Khan, M Ebrahim - arXiv preprint arXiv …, 2015 - arxiv.org
In Wireless Sensor Networks, the sensor nodes are battery powered small devices designed
for long battery life. These devices also lack in terms of processing capability and memory. In …

Analysis of Avalanche effect in Cryptographic Algorithms

J Kaur, KRR Kumar - 2022 10th International Conference on …, 2022 - ieeexplore.ieee.org
-Information security is becoming significantly more crucial for data transmission and storage
due to the rapid development of digital information exchange in digital mode. Since the …