[HTML][HTML] Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange

P Kumar, V Saxena - Journal of Computer and Communications, 2024 - scirp.org
Data security is a very important part of data transmission over insecure channels connected
through high-speed networks. Due to COVID-19, the use of data transmission over insecure …

[PDF][PDF] Encryption Technique Using a Mixture of Hill Cipher and Modified DNA for Secure Data Transmission

KA Ameen, W khalid Abdulwahab… - International Journal of …, 2025 - iiict.uob.edu.bh
The 21st century has experienced an information surge due to rapid technological
advancement, rendering knowledge a much more vital strategic asset. Due to the lack of …

Optimizing blockchain mining techniques through the application of machine learning

M Poriye, S Upadhyaya - Artificial Intelligence and Information …, 2025 - taylorfrancis.com
By establishing a decentralized and reliable foundation for digital transactions, blockchain
technology has ushered in transformative changes across a spectrum of industries …

Parallel Implementation of DNA Cryptography Encryption Scheme using MPI and CUDA

NN Kamath, KN Manjunath… - … on Advances in …, 2023 - ieeexplore.ieee.org
There is a great requirement for cryptographic systems to secure shared or transmitted data
over the internet. Periodic modification of the currently used cryptographic scheme to encrypt …

Survey on DNA Encryption Techniques.

M GR - Grenze International Journal of Engineering & …, 2024 - search.ebscohost.com
The area of DNA cryptography is an interdisciplinary field that has emerged recently,
focusing on the possible applications of DNA (deoxyribonucleic acid) molecules for secure …

Enhancing the Present Block Cipher for IoT Applications: Development and Comparative Analysis of a Lightweight Algorithm with Improved Key Schedule Algorithm

M Imdad - 2023 - search.proquest.com
Abstract The Internet of Things (IoT) has massive connectivity of resource-constrained
devices, and enormous data exchange between devices has made it susceptible to various …