Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Lightweight cryptographic algorithms for guessing attack protection in complex internet of things applications

MK Hasan, M Shafiq, S Islam, B Pandey… - …, 2021 - Wiley Online Library
As the world keeps advancing, the need for automated interconnected devices has started to
gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been …

[PDF][PDF] A survey on cryptography algorithms

OG Abood, SK Guirguis - International Journal of Scientific and …, 2018 - academia.edu
DOI: 10.29322/IJSRP. 8.7. 2018. p7978 http://dx. doi. org/10.29322/IJSRP. 8.7. 2018. p7978
Abstract-With the major advancements in the field of technology and electronics, one …

[PDF][PDF] A survey on the cryptographic encryption algorithms

MF Mushtaq, S Jamel, AH Disina… - … Journal of Advanced …, 2017 - researchgate.net
Security is the major concern when the sensitive information is stored and transferred across
the internet where the information is no longer protected by physical boundaries …

[PDF][PDF] Cryptography: a comparative analysis for modern techniques

F Maqsood, M Ahmed, MM Ali… - International Journal of …, 2017 - pdfs.semanticscholar.org
Cryptography plays a vital role for ensuring secure communication between multiple entities.
In many contemporary studies, researchers contributed towards identifying best …

A study of DES and Blowfish encryption algorithm

T Nie, T Zhang - Tencon 2009-2009 IEEE Region 10 …, 2009 - ieeexplore.ieee.org
With the rapid growing of internet and networks applications, data security becomes more
important than ever before. Encryption algorithms play a crucial role in information security …

[PDF][PDF] Efficiency analysis and security evaluation of image encryption schemes

J Ahmad, F Ahmed - computing, 2010 - Citeseer
In recent years, there has been significant development in multimedia technologies.
Transmission of multimedia data such as audio, video and images over the Internet is now …

Rotation left digits to enhance the security level of message blocks cryptography

A Al-Hyari, K Aldebei, ZA Alqadi, B Al-Ahmad - IEEE Access, 2022 - ieeexplore.ieee.org
Due to the availability of several social media platforms and their use in sending text
messages, it is necessary to provide an easy and safe way to protect messages from being …

Enhancing image cryptography performance with block left rotation operations

MS Al-Batah, MS Alzboon, M Alzyoud… - … Intelligence and Soft …, 2024 - Wiley Online Library
In today's interconnected world, the transmission of both lengthy and concise text messages
is ubiquitous across diverse communication platforms. With the proliferation of sensitive and …

[PDF][PDF] A literature review on rsa, des and aes encryption algorithms

R Sood, H Kaur - Emerging Trends in Engineering and Management, 2023 - academia.edu
Nowadays, as more and more information is communicated via computers, the need is to
ensure that this information is secure and information can be secured by the means of …