A Survey on the Cryptographic Encryption Algorithms
暂无分享,去创建一个
Zahraddeen Abubakar Pindar | Abdulkadir Hassan Disina | Mustafa Mat Deris | Sapiee Jamel | Muhammad Faheem Mushtaq | M. M. Deris | Nur Shafinaz Ahmad Shakir | S. Jamel | M. F. Mushtaq | N. Shakir | Z. Pindar | Sapiee Jamel
[1] Shinsuke Tamura,et al. A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets , 2015, 2015 International Conference on Networking Systems and Security (NSysS).
[2] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[3] Narander Kumar,et al. Performance Evaluation of Encryption/Decryption Mechanisms to Enhance Data Security , 2016 .
[4] Mark Stamp,et al. Information security - principles and practice , 2005 .
[5] D. K. Branstad,et al. Data Encryption Standard: past and future , 1988, Proc. IEEE.
[6] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[7] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[8] Irfan Khan,et al. Cloud Computing Environment and Security Challenges: A Review , 2017 .
[9] William C. Barker,et al. TECHNOLOGY ADMINISTRATION , 2004 .
[10] Sapiee Jamel,et al. The Hybrid Cubes Encryption Algorithm (HiSea) , 2011 .
[11] Stuart D. Walker,et al. Implement A Novel Symmetric Block Cipher Algorithm , 2014 .
[12] Zahraddeen Abubakar Pindar,et al. Enhanced Caeser Cipher to Exclude Repetition and Withstand Frequency Cryptanalysis , 2014 .
[13] Vincent Rijmen,et al. Rijndael, the advanced encryption standard , 2001 .
[14] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .
[15] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[16] K. Vasanth,et al. BLOWFISH ENCRYPTION ALGORITHM FOR INFORMATION SECURITY , 2015 .
[17] Priyadarshini Patila,et al. A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .
[18] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[19] Alasdair McAndrew. Data Encryption Standard (DES) for Sage , 2009 .
[20] Kalinka Regina Lucas Jaquie Castelo Branco,et al. Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general purpose computer , 2016, J. Netw. Comput. Appl..
[21] A. K. Mandal,et al. Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[22] Mohey M. Hadhoud,et al. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..
[23] M.M. Deris,et al. Diffusive primitives in THE design of modern cryptographic algorithms , 2008, 2008 International Conference on Computer and Communication Engineering.
[24] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[25] William Millan,et al. Strengthening the Key Schedule of the AES , 2002, ACISP.
[26] Mansoor Ebrahim,et al. Symmetric Algorithm Survey: A Comparative Analysis , 2013, ArXiv.
[27] Teng Zhang,et al. A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.
[28] Zahraddeen Abubakar Pindar,et al. A Key Scheduling Algorithm Based on Dynamic Quasigroup String Transformation and All-Or-Nothing Key Derivation Function , 2017 .
[29] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[30] Meghna Vekariya,et al. Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms , 2015 .
[31] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[32] Sapiee Jamel,et al. Key Generation Technique based on Triangular Coordinate Extraction for Hybrid Cubes , 2017 .
[33] Munam Ali Shah,et al. Cryptography: A Comparative Analysis for Modern Techniques , 2017 .
[34] Sergey E. Adadurov,et al. Evaluation of cryptographic primitives security based on proximity to the Latin square , 2016, 2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT).
[35] N. Sivanandam,et al. A Survey on Cryptography using Optimization algorithms in WSNs , 2015 .
[36] S. Kavitha,et al. KEYLESS USER DEFINED OPTIMAL SECURITY ENCRYPTION , 2013 .
[37] Sapiee Jamel,et al. A Cryptographic Algorithm Based on Hybrid Cubes , 2010, ICCSA.
[38] Zahraddeen Abubakar Pindar,et al. All-or-Nothing Key Derivation Function Based on Quasigroup String Transformation , 2016, 2016 International Conference on Information Science and Security (ICISS).
[39] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .