[PDF][PDF] A survey on the cryptographic encryption algorithms

MF Mushtaq, S Jamel, AH Disina… - … Journal of Advanced …, 2017 - researchgate.net
Security is the major concern when the sensitive information is stored and transferred across
the internet where the information is no longer protected by physical boundaries …

Secure and privacy-aware blockchain design: Requirements, challenges and solutions

S Aslam, A Tošić, M Mrissa - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
During the last decade, distributed ledger solutions such as blockchain have gained
significant attention due to their decentralized, immutable, and verifiable features. However …

Hybrid homomorphic‐asymmetric lightweight cryptosystem for securing smart devices: A review

R Mathews, DV Jose - Transactions on Emerging …, 2024 - Wiley Online Library
Abstract The Internet of Things (IoT) has emerged as a new concept in information and
communication technology, and its structure depends on smart device communications. It …

Assessment of hybrid cryptographic algorithm for secure sharing of textual and pictorial content

P William, A Choubey, GS Chhabra… - … on electronics and …, 2022 - ieeexplore.ieee.org
Nowadays, networks have become global in scope, and information has assumed a digital
shape. Due to the volume of data transmitted over the internet, data security has become a …

Rotation left digits to enhance the security level of message blocks cryptography

A Al-Hyari, K Aldebei, ZA Alqadi, B Al-Ahmad - IEEE Access, 2022 - ieeexplore.ieee.org
Due to the availability of several social media platforms and their use in sending text
messages, it is necessary to provide an easy and safe way to protect messages from being …

Secure framework enhancing AES algorithm in cloud computing

IA Awan, M Shiraz, MU Hashmi… - Security and …, 2020 - Wiley Online Library
The tremendous growth of computational clouds has attracted and enabled intensive
computation on resource‐constrained client devices. Predominantly, smart mobiles are …

Performance evaluation of RSA, ElGamal, and paillier partial homomorphic encryption algorithms

SJ Mohammed, DB Taha - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Information security has progressed dramatically over the past century because of the
significant advancements in computer and communications research. As a result, numerous …

Data is the new oil–sort of: a view on why this comparison is misleading and its implications for modern data administration

C Stach - Future Internet, 2023 - mdpi.com
Currently, data are often referred to as the oil of the 21st century. This comparison is not only
used to express that the resource data are just as important for the fourth industrial …

[PDF][PDF] Using highly secure data encryption method for text file cryptography

MM Abu-Faraj, ZA Alqadi - International Journal of Computer …, 2021 - researchgate.net
Many standard methods are used for secret text files and secrete short messages
cryptography, these methods are efficient when the text to be encrypted is small, and the …

A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish

H Dibas, KE Sabri - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Develo** software applications that provide services in all business fields such as finance,
health, education, real estate and social media etc., must maintain various quality attributes …