[HTML][HTML] Survey on public key cryptography scheme for securing data in cloud computing

J Athena, V Sumathy - Circuits and Systems, 2017 - scirp.org
Numerous advancements in the Information Technology (IT) require the proper security
policy for the data storage and transfer among the cloud. With the increase in size of the …

A hybrid encryption algorithm based on RSA and Diffie-Hellman

S Gupta, J Sharma - 2012 IEEE International Conference on …, 2012 - ieeexplore.ieee.org
Internet and Network applications have seen a tremendous growth in the last decade. As a
result incidents of cyber attacks and compromised security are increasing. This requires …

Built-in encrypted health cloud environment for sharing COVID-19 data

MY Shakor, NMS Surameery - 2021 3rd International …, 2021 - ieeexplore.ieee.org
During the COVID-19 pandemic, the increasing amount of personal and sensitive data
collected in the healthcare inistiutions, make it necessary to use the cloud not only to store …

[PDF][PDF] Comparison of asymmetric algorithms in cryptography

N Garg, P Yadav - J. Comput. Sci. Mob. Comput.(IJCSMC), 2014 - academia.edu
In this paper we compare asymmetric algorithm like (RSA, Elliptic curve, OAEP) which is
used for security when data is transmitting over the network. These algorithms are based on …

Methods toward enhancing RSA algorithm: a survey

SS Al-Kaabi - Available at SSRN 3819524, 2019 - papers.ssrn.com
Cryptography defines different methods and technologies used in ensuring communication
between two parties over any communication medium is secure, especially in presence of a …

A comprehensive study on various modifications in RSA algorithm

GR Patel, K Panchal, SR Patel - International Journal of Engineering …, 2014 - rjwave.org
Cryptography is derived from a Greek word which means the art of protecting information by
converting it into an unreadable format. In order to prevent some unwanted users or people …

Hybrid encryption algorithm based improved RSA and Diffie-Hellman

R Bodkhe, V Jethani - International Journal of Engineering …, 2015 - indianjournals.com
Internet and Network applications have seen a tremendous growth in the last decade. As a
result incidents of cyber attacks and compromised security are increasing. This requires …

[PDF][PDF] A Study on Asymmetric Key Exchange Authentication Protocols

DDSR Murthy, B Madhuravani… - International Journal of …, 2012 - academia.edu
Key exchange protocols enable the use of sharedkey cryptography to protect transmitted
data over insecure networks. The key exchange protocols are classified into i) symmetric ii) …

[PDF][PDF] ASurvey ON ENHANCED RSA ALGORITHMS

SS Al-Kaabi, SB Belhaouari - CS & IT Conference Proceedings, 2019 - csitcp.com
Cryptography is a field in computer science and mathematics that entails techniques of
securing communication between two parties in the presence of a third party. This is …

A Study on Encryption and Decryption System

S Goyal - 2021 - papers.ssrn.com
The presented document aims to review the methodologies used for cryptography.
Cryptography, a Greek word meaning'protected data with an unreadable format'has become …