A review on various cryptographic techniques & algorithms

DK Sharma, NC Singh, DA Noola, AN Doss… - Materials Today …, 2022 - Elsevier
In current world security of the wired and remote organization is something essential.
Organization security is a significant part of data sharing. Many groundbreaking executions …

Revam** Federated Learning Security from a Defender's Perspective: A Unified Defense with Homomorphic Encrypted Data Space

KN Kumar, R Mitra, CK Mohan - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
Federated Learning (FL) facilitates clients to collaborate on training a shared machine
learning model without exposing individual private data. Nonetheless FL remains …

[PDF][PDF] High Capacity data hiding using LSB Steganography and Encryption

SA Laskar, K Hemachandran - International Journal of Database …, 2012 - academia.edu
The network provides a method of communication to distribute information to the masses.
With the growth of data communication over computer network, the security of information …

Medical image encryption: an application for improved padding based GGH encryption algorithm

M Sokouti, A Zakerolhosseini… - The open medical …, 2016 - pmc.ncbi.nlm.nih.gov
Medical images are regarded as important and sensitive data in the medical informatics
systems. For transferring medical images over an insecure network, develo** a secure …

Analisa Algoritma Ciphers Transposition: Study Literature

JA Kusumaningtyas - Multimatrix, 2018 - jurnal.unw.ac.id
Technological developments allow the sending and storage of data can be done quickly,
easily, practically, and safely. One security used uses cryptographic techniques …

[PDF][PDF] Automated cryptanalysis of transposition ciphers using cuckoo search algorithm

M Heydari, MN Senejani - … Journal of Computer Science and Mobile …, 2014 - academia.edu
An approach of information security is Cryptography. Cryptanalysis is the science study to
break cryptography without the encryption key. The present paper shows the benefits of the …

A Novel Way of Decrypting Single Columnar Transposition Ciphers

NM Adyapak, B Vineetha… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
Single columnar transposition is an encryption technique used in text encryption to produce
cipher text which is a permutation of its original text. In this study, cryptanalysis of Single …

Enhancing Security in Modern Transposition Ciphers Through Algorithmic Innovations and Advanced Cryptanalysis

A Armah, S Asare, E Abrefah-Mensah - The Indonesian Journal of Computer …, 2024 - ijcs.net
Columnar transposition ciphers have various vulnerabilities and limitations that render them
vulnerable to modern cryptographic threats and advanced cryptanalysis techniques. It is …

Securing Private Key using New Transposition Cipher Technique

MGZ Fernando, AM Sison… - 2019 IEEE Eurasia …, 2019 - ieeexplore.ieee.org
The security of any public key cryptosystem depends on the private key thus, it is important
that only an authorized person can have access to the private key. The paper presents a …

An approach to Improving Columnar Permutation Cipher for Wills in Distributed Systems of Law Firms

E Nwokedi, O Adeniyi Ojerinde, J Ojeniyi… - Proceedings of the 5th …, 2021 - dl.acm.org
With the evolution of cryptography in the twentieth century, classical ciphers (transposition
ciphers) are gradually being pushed out because it now possesses low security ratings …