A novel approach of symmetric key cryptography
Cryptography plays an important role in secured data communication over the network using
unknown, untrusted mediums. In the fast digital transformation, traffic on network increasing …
unknown, untrusted mediums. In the fast digital transformation, traffic on network increasing …
Application of laplace transform to cryptography using linear combination of functions
EO Adeyefa, LS Akinola… - TWMS Journal of Applied …, 2021 - belgelik.isikun.edu.tr
The strength of nations, organizations such as military, intelligence agency, hinges primarily
on its ability to keep sensitive information secure from intruders. Today, cryptography is used …
on its ability to keep sensitive information secure from intruders. Today, cryptography is used …
A new cryptographic scheme using the Chebyshev polynomials
EO Adeyefa, LS Akinola… - … and Computer Science …, 2020 - ieeexplore.ieee.org
A secure environment is central to the growth and development of any nation. Crime and
terrorism impede the stability and governance of any security sector. Hence, the need for …
terrorism impede the stability and governance of any security sector. Hence, the need for …
Multi-cipher Encrypter Using Symmetric Key Algorithms
V Tripathi, A Yadav, R Chithreddy… - … on Communication and …, 2021 - Springer
Data confidentiality is one of the primary concerns for all organizations as well as individuals
all around the world. With the advent of technology and easier access of attacking tools and …
all around the world. With the advent of technology and easier access of attacking tools and …
[PDF][PDF] Security from Caesar to Vigenère
A Santos - kriativ-tech.com
Cryptography has accompanied the human being for centuries, starting with being used only
by kings and emperors to communicate with their governors and military until now when its …
by kings and emperors to communicate with their governors and military until now when its …
[PDF][PDF] Enhanced Cryptographic System Using Caesar Cipher and Deoxyribonucleic Acid (DNA) Sequences
AA Ganiyat, AT Oladele, DA Olorunleke… - Journal of …, 2021 - journals.futa.edu.ng
Information security encompasses the protection of digital privacy strategies which are used
to stop illegal access to information, records and computing devices. This paper applied an …
to stop illegal access to information, records and computing devices. This paper applied an …
Secure AI-based sharing and transmission of data
Z Tang, A Tang - US Patent 11,822,373, 2023 - Google Patents
Implementations provide a secure and flexible encoding technique that enables data set
owners to share data without losing interoperability or breaking data constraints. A device …
owners to share data without losing interoperability or breaking data constraints. A device …
Multi-Layered Encryption Method
U Sudibyo, C Paramita - 2019 3rd International Conference on …, 2019 - ieeexplore.ieee.org
Information is categorized as precious thing when only current specific people have the
opportunity to gain it, or it is so called confidential. Confidential information is secure if it …
opportunity to gain it, or it is so called confidential. Confidential information is secure if it …