Comprehensive review and analysis of cryptography techniques in cloud computing

K Sasikumar, S Nagarajan - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud computing is a fast-growing industry that offers various online services, including
software, computing resources, and databases. Its payment model is usage-based, whereas …

Chaotic lightweight cryptosystem for image encryption

J Ferdush, M Begum, MS Uddin - Advances in Multimedia, 2021 - Wiley Online Library
Data transmission over the Internet and the personal network has been risen day by day due
to the advancement of multimedia technology. Hence, it is today's prime concern to protect …

Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices

HM Mohammad, AA Abdullah - … Computing Electronics and …, 2022 - telkomnika.uad.ac.id
The restricted devices have a small memory, simple processor, and limited power. To secure
them, we need lightweight cryptography algorithms, taking into account the limited …

RETRACTED ARTICLE: Lightweight multi-level authentication scheme for secured data transmission in IoT-Fog context

P Kanani, P Vartak, K Dabre, V Gohil, A Nanade… - Journal of Combinatorial …, 2023 - Springer
The IoT-sensed data is normally processed by Cloud Servers (CSs), but to reduce the cloud
load and to avert network bandwidth wastage, Fog Computing (FC) is used. FC storages are …

[PDF][PDF] A Survey On Dna Cryptographic Techniques, Challenges And Future Trends.

NM Turab, M Abu-Alhaija, HA Owida, JI Al-Nabulsi - Webology, 2022 - researchgate.net
DNA Cryptography is one of the speedily growing technologies in the world as unbreakable
algorithms, as well as to design and implement more complex and resistant to differential …

An Efficient Lightweight Cryptosystem Using Substitution-Shuffling Based Key Generation

AA Provat, MM Haque - 2023 26th International Conference on …, 2023 - ieeexplore.ieee.org
In recent years, there has been a meteoric rise in the use of small computing devices,
including RFID (Radio Frequency Identification) tags, wireless sensors, embedded …

Analysis and comparison of different cryptographic algorithms

Y Aggarwal, N Kumar, V Devrani… - … International Journal of …, 2022 - indianjournals.com
Cryptography is widely used to hide information and communications securely using
mathematical calculations or mechanisms called cryptographic algorithms. For encryption …