A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention
暂无分享,去创建一个
Mohammed Nazeh Abdul Wahid | Abdulrahman Ali | Babak Esparham | Mohamed Marwan | Babak Esparham | M. Marwan | A. Ali
[1] M. Nithya,et al. A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM , 2013 .
[2] Ritu Tripathi,et al. Comparative Study of Symmetric and Asymmetric Cryptography Techniques , 2014 .
[3] Priyadarshini Patila,et al. A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .
[4] A. K. Mandal,et al. Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[5] Pooja Bindlish. Optimization of Cryptography Algorithms in Cloud Computing , 2017 .
[6] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[7] Juan E. Tapiador,et al. Automated design of a lightweight block cipher with Genetic Programming , 2008, Int. J. Knowl. Based Intell. Eng. Syst..
[8] Prashant Sharma,et al. RSA algorithm using modified subset sum cryptosystem , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[9] Rajiv Munjal,et al. Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures , 2011 .
[10] Xin Zhou,et al. Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.
[11] Ritu Pahal. Efficient Implementation of AES , 2013 .
[12] Bruce Schneier,et al. Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.
[13] .S Karthik. Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System , 2014 .
[14] Pratap Chandra Mandal,et al. Superiority of Blowfish Algorithm , 2012 .
[15] Daniela Fischer,et al. Cryptography And Network Security Principles And Practice , 2016 .
[16] B. B. Zaidan,et al. New Comparative Study Between DES, 3DES and AES within Nine Factors , 2010, ArXiv.
[17] K. Kanagaram,et al. COMPARATIVE ANALYSIS OF PERFORMANCE EFFICIENCY AND SECURITY MEASURES OF SOME ENCRYPTION ALGORITHMS , 2012 .
[18] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.