[PDF][PDF] A review on symmetric key encryption techniques in cryptography

MU Bokhari, QM Shallal - International journal of computer …, 2016 - researchgate.net
In the era of digital communication, the information sharing is rapidly increased. All the data
which being sent or received are vulnerable to many active and passive attacks. Therefore …

Encryption algorithm in cloud computing

DKR Shukla, VKR Dwivedi, MC Trivedi - Materials Today: Proceedings, 2021 - Elsevier
The exponential growth of cloud computing, an efficient data security system becomes
essential for cloud computing-based environments. Encryption algorithms perform a critical …

A Review on Symmetric Key Cryptography Algorithms.

A Kaur - International Journal of Advanced Research in …, 2017 - search.ebscohost.com
Security is the most important aspect in the field of internet and network application. It is an
important task to secure information over the network. To secure information, cryptography …

[PDF][PDF] Generalized signcryption based on elliptic curve

S Hasan - 2021 - thesis.cust.edu.pk
A cryptographic technique called signcryption combines the role of digital signature and
encryption in a single logical step. Signcryption provides message confidentiality and …

[PDF][PDF] Key exchange protocol based on matrices using tropical algebra

S Mehmood - Capital University: Bexley, OH, USA, 2019 - thesis.cust.edu.pk
Tropical cryptography is the study of classical cryptography protocols built on tropical
algebras. In this thesis, we review a key exchange protocol presented by Zeriouh et al. They …

[PDF][PDF] Cryptanalysis of the Encryption Scheme Based on Advanced Hill Cipher Algorithm

T Azam - CAPITAL UNIVERSITY, nd, 2020 - thesis.cust.edu.pk
The Hill cipher algorithm is one of the symmetric key algorithms that have several
advantages in data encryption. But, the inverse of the key matrix used for encrypting the …

[PDF][PDF] Symmetric key encryption using a simple pseudo-random generator to provide more secure communication

B Bharadwaj, S Shukla, L Shalini - Int J Tech Res Appl, 2018 - ijtra.com
Symmetric key encryption is a cryptographic algorithm in which same keys are used for both,
encryption and decryption of the information. Sometimes it is also referred to as the secret …

[PDF][PDF] Student privacy preserving framework based on blockchain technology

S Noureen - 2019 - thesis.cust.edu.pk
Blockchain technology enables distributed, encrypted and secure logging of digital
transactions. It is underlying technology of Bitcoin and other cryptocurrencies. Blockchain is …

[PDF][PDF] Noncommutative cryptography using extra special group and galois field

K Ali - 2019 - thesis.cust.edu.pk
Non-commutative cryptography (NCC) is truly fascinating with the great hope of advancing
performance and security for high end applications. It provides a high level of safety …

[PDF][PDF] Cryptographic schemes based on enhanced matrix power function

S Noor - 2019 - thesis.cust.edu.pk
A new enhanced matrix power function (MPF) is presented for the construction of
cryptographic primitives and an Asymmetric Cipher in non-commutative cryptography. As …