[PDF][PDF] A review on symmetric key encryption techniques in cryptography
MU Bokhari, QM Shallal - International journal of computer …, 2016 - researchgate.net
In the era of digital communication, the information sharing is rapidly increased. All the data
which being sent or received are vulnerable to many active and passive attacks. Therefore …
which being sent or received are vulnerable to many active and passive attacks. Therefore …
Encryption algorithm in cloud computing
The exponential growth of cloud computing, an efficient data security system becomes
essential for cloud computing-based environments. Encryption algorithms perform a critical …
essential for cloud computing-based environments. Encryption algorithms perform a critical …
A Review on Symmetric Key Cryptography Algorithms.
A Kaur - International Journal of Advanced Research in …, 2017 - search.ebscohost.com
Security is the most important aspect in the field of internet and network application. It is an
important task to secure information over the network. To secure information, cryptography …
important task to secure information over the network. To secure information, cryptography …
[PDF][PDF] Generalized signcryption based on elliptic curve
S Hasan - 2021 - thesis.cust.edu.pk
A cryptographic technique called signcryption combines the role of digital signature and
encryption in a single logical step. Signcryption provides message confidentiality and …
encryption in a single logical step. Signcryption provides message confidentiality and …
[PDF][PDF] Key exchange protocol based on matrices using tropical algebra
S Mehmood - Capital University: Bexley, OH, USA, 2019 - thesis.cust.edu.pk
Tropical cryptography is the study of classical cryptography protocols built on tropical
algebras. In this thesis, we review a key exchange protocol presented by Zeriouh et al. They …
algebras. In this thesis, we review a key exchange protocol presented by Zeriouh et al. They …
[PDF][PDF] Cryptanalysis of the Encryption Scheme Based on Advanced Hill Cipher Algorithm
T Azam - CAPITAL UNIVERSITY, nd, 2020 - thesis.cust.edu.pk
The Hill cipher algorithm is one of the symmetric key algorithms that have several
advantages in data encryption. But, the inverse of the key matrix used for encrypting the …
advantages in data encryption. But, the inverse of the key matrix used for encrypting the …
[PDF][PDF] Symmetric key encryption using a simple pseudo-random generator to provide more secure communication
B Bharadwaj, S Shukla, L Shalini - Int J Tech Res Appl, 2018 - ijtra.com
Symmetric key encryption is a cryptographic algorithm in which same keys are used for both,
encryption and decryption of the information. Sometimes it is also referred to as the secret …
encryption and decryption of the information. Sometimes it is also referred to as the secret …
[PDF][PDF] Student privacy preserving framework based on blockchain technology
S Noureen - 2019 - thesis.cust.edu.pk
Blockchain technology enables distributed, encrypted and secure logging of digital
transactions. It is underlying technology of Bitcoin and other cryptocurrencies. Blockchain is …
transactions. It is underlying technology of Bitcoin and other cryptocurrencies. Blockchain is …
[PDF][PDF] Noncommutative cryptography using extra special group and galois field
K Ali - 2019 - thesis.cust.edu.pk
Non-commutative cryptography (NCC) is truly fascinating with the great hope of advancing
performance and security for high end applications. It provides a high level of safety …
performance and security for high end applications. It provides a high level of safety …
[PDF][PDF] Cryptographic schemes based on enhanced matrix power function
S Noor - 2019 - thesis.cust.edu.pk
A new enhanced matrix power function (MPF) is presented for the construction of
cryptographic primitives and an Asymmetric Cipher in non-commutative cryptography. As …
cryptographic primitives and an Asymmetric Cipher in non-commutative cryptography. As …