Cloud computing platform: Performance analysis of prominent cryptographic algorithms
With advancements in science and technology, cloud computing is the next big thing in the
industry. Cloud cryptography is a technique that uses encryption algorithms to secure data …
industry. Cloud cryptography is a technique that uses encryption algorithms to secure data …
Introduction to classical cryptography
V Rajasekar, J Premalatha… - Quantum Blockchain …, 2022 - Wiley Online Library
In today's world, with societies of information that transmits a growing number of personal
data via public channels, the protection of information is a global challenge. It is the …
data via public channels, the protection of information is a global challenge. It is the …
Enhancing the Hill Cipher Algorithm and Employing a One Time Pad Key Generation Technique
MD Gietaneh, TB Akele - Abyssinia Journal of Engineering and …, 2023 - abjol.org.et
Mobile money has evolved to enhance financial inclusion in many developing countries
through the development of smartphones and financial technologies. The majority of mobile …
through the development of smartphones and financial technologies. The majority of mobile …
Low-Cost Energy Efficient Encryption Algorithm for Portable Device
AF Alam, MS Kaiser - Proceedings of the Fourth International Conference …, 2023 - Springer
The number of portable digital devices is escalating day by day with the advancement of
technology. As the number of digital devices users is expanding, the security concer for the …
technology. As the number of digital devices users is expanding, the security concer for the …
[PDF][PDF] Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
Cryptography steganography is a practical tool for data security. Hybridization of the
cryptography with steganography can provide more security by taking advantage of each …
cryptography with steganography can provide more security by taking advantage of each …