A Survey on Cryptography Algorithms
暂无分享,去创建一个
[1] Sheetal Charbathia. A Comparative Study of Rivest Cipher Algorithms , 2014 .
[2] Nagesh Kumar,et al. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .
[3] K. Patel,et al. Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing , 2016 .
[4] Nabi Mustafa,et al. Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication , 2015 .
[5] Rehab F. Hassan,et al. New Approach for Modifying Blowfish Algorithm by Using Multiple Keys , 2011 .
[6] Phillip Rogaway,et al. A Software-Optimized Encryption Algorithm , 1998, Journal of Cryptology.
[7] Rahul Gupta,et al. Notice of Violation of IEEE Publication Principles , 2004 .
[8] Mahmoud A. Elsadd,et al. Investigation of cryptography algorithms used for security and privacy protection in smart grid , 2017, 2017 Nineteenth International Middle East Power Systems Conference (MEPCON).
[9] A. Suruliandi,et al. Performance analysis of encryption algorithms for Information Security , 2013, 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT).
[10] Pierre E. Abi-Char,et al. Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey , 2015 .
[11] Xin Zhou,et al. Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.
[12] Zoran Hercigonja. Comparative Analysis of Cryptographic Algorithms , 2017 .
[13] Rajan Mishra,et al. Comparative Analysis Of Encryption Algorithms For Data Communication , 2011 .
[14] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[15] Ritu Agarwal,et al. Peformance analysis of data encryption algorithms , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[16] A. K. Mandal,et al. Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[17] Gurjeevan Singh,et al. A Study of New Trends in Blowfish Algorithm , 2011 .
[18] Bruce Schneier,et al. Applied cryptography, second edition : protocols, algorithms,and source code in C , 2015 .
[19] K. Vasanth,et al. BLOWFISH ENCRYPTION ALGORITHM FOR INFORMATION SECURITY , 2015 .
[20] Hitesh Gupta,et al. Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm , 2013 .
[21] Raman Maini,et al. COMPARISON OF DATA ENCRYPTION ALGORITHMS , 2011 .
[22] Pratap Chandra Mandal,et al. Superiority of Blowfish Algorithm , 2012 .
[23] Saudi Arabia,et al. Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography , 2013 .
[24] Bahar Saini. Survey on Performance Analysis of Various Cryptographic Algorithms , 2014 .
[25] Gurpreet Singh,et al. A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.
[26] Vikas Tyagi,et al. IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY , 2012 .
[27] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[28] Aamna Patel,et al. Image encryption and decryption using blowfish algorithm , 2012 .
[29] Helena Handschuh,et al. x2 Cryptanalysis of the SEAL Encryption Algorithm , 1997, FSE.