Analysis of encryption algorithms (RSA, SRNN and 2 key pair) for information security

SY Bonde, US Bhadade - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
To transmit confidential information like e-mails, banking transactions, credit card details etc.
over the unsecured network like internet Security is essential. There are more chances to …

[PDF][PDF] Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

I Jahan, M Asif, LJ Rozario - American Journal of Engineering …, 2015 - academia.edu
Security is required to transmit confidential information over the network. Security is also
demanding in wide range of applications. Cryptographic algorithms play a vital role in …

[PDF][PDF] A modified RSA encryption technique based on multiple public keys

AA Ayele, V Sreenivasarao - International Journal of Innovative …, 2013 - academia.edu
In the today‟ s world, security is required to transmit confidential information over the
network. Security is also demanding in wide range of applications. Cryptographic algorithms …

Multi-fingerprint unimodel-based biometric authentication supporting cloud computing

P Rajeswari, S Viswanadha Raju, AS Ashour… - Intelligent techniques in …, 2017 - Springer
Cloud computing is one of the emerging technologies that transfers network users to the
next level. Security is one of the critical challenges faced by cloud computing. Biometrics …

[PDF][PDF] SMS security in mobile devices: a survey

MW Khan - International Journal of Advanced Networking and …, 2013 - academia.edu
-------------------------------------------------------------------ABSTRACT-------------------------------------------
-------------------The Short Message Service (SMS) is one of the frequently used mobile …

A new modified version of standard RSA cryptography algorithm

SB Das, SK Mishra, AK Sahu - … : Proceedings of ICACNI 2018, Volume 2, 2020 - Springer
Data security is an open research challenge due to the rapid evolution in communication
over an unsecured network. In this direction, cryptographic algorithms play an important role …

[PDF][PDF] Analysis and enhancement of speed in public key cryptography using message encoding algorithm

DIG Amalarethinam, JS Geetha… - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
In the world of internet, Cryptography places a vital role as an effective measure to maintain
information security. Whenever the security of public key cryptography algorithm increases …

Security enhancement and speed monitoring of RSA algorithm

S Patel, K Shah - International Journal of Engineering Development and …, 2014 - rjwave.org
Cryptography involves the science and technique to secure the information. Public key
cryptography with the idea of key pair-up is a great break-through for the traditional …

Database encryption using asymmetric keys: a case study

A Boicea, F Radulescu, CO Truica… - 2017 21st International …, 2017 - ieeexplore.ieee.org
Data security has become an issue of increasing importance, especially for Web
applications and distributed databases. One solution is using cryptographic algorithms …

A Hybrid Cryptosystem approach for file security by using merging mechanism

M Sharma, V Sharma - 2016 2nd international conference on …, 2016 - ieeexplore.ieee.org
The expeditious growth of internet and networks applications has given rise to many data
security issues. Encryption algorithm plays a crucial role in information and network security …