Journal articles on the topic 'Hybrid Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hybrid Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
HOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Full textShuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (2025): 6–10. https://doi.org/10.5281/zenodo.14868992.
Full textManap, Abusaid, Gulnar Abitova, Gulzhan Uskenbayeva, and Aigul Shaikhanova. "DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW." Вестник КазАТК 129, no. 6 (2023): 205–15. http://dx.doi.org/10.52167/1609-1817-2023-129-6-205-215.
Full textSantoso, Yogi Suryo. "Message Security Using a Combination of Hill Cipher and RSA Algorithms." Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA) 1, no. 1 (2021): 20–28. http://dx.doi.org/10.54076/jumpa.v1i1.38.
Full textNovianti, Chofifah Alfin, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks." Jurnal Riset Mahasiswa Matematika 3, no. 1 (2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.
Full textNana, Nana, and Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security." Bulletin of Applied Mathematics and Mathematics Education 1, no. 2 (2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.
Full textBhawane, Manas. "Secured Data Storage on the Cloud Using Hybrid Cryptography." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2516–18. https://doi.org/10.22214/ijraset.2024.65674.
Full textJohn, Anita, and Jimmy Jose. "Hash Function Design Based on Hybrid Five-Neighborhood Cellular Automata and Sponge Functions." Complex Systems 32, no. 2 (2023): 171–88. http://dx.doi.org/10.25088/complexsystems.32.2.171.
Full textYang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Full textManap, A. T., and G. A. Abitova. "Development of information technology for secure file storage based on hybrid cryptography methods." Bulletin of Shakarim University. Technical Sciences 1, no. 4(12) (2023): 39–46. http://dx.doi.org/10.53360/2788-7995-2023-4(12)-6.
Full textKarunamurthy, Dr A., and S. Sathiyaraj. "Hybrid Cryptography DNA-Based Vigenère Cipher for Secure File Encryption." International Scientific Journal of Engineering and Management 03, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/isjem02134.
Full textTaher, Yalmaz Najm Aldeen, Kameran Ali Ameen, and Ahmed M. Fakhrudeen. "An efficient hybrid technique for message encryption using caesar cipher and deoxyribonucleic acid steganography." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 1096–104. https://doi.org/10.11591/ijeecs.v28.i2.pp1096-1104.
Full textCherkaoui Dekkaki, Kanza, Igor Tasic, and Maria-Dolores Cano. "Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process." Technologies 12, no. 12 (2024): 241. http://dx.doi.org/10.3390/technologies12120241.
Full textAldeen Taher, Yalmaz Najm, Kameran Ali Ameen, and Ahmed M. Fakhrudeen. "An efficient hybrid technique for message encryption using caesar cipher and deoxyribonucleic acid steganography." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 1096. http://dx.doi.org/10.11591/ijeecs.v28.i2.pp1096-1104.
Full textMutar, Ahmed Fakhir, Leyli Mohammad Khanli, and Hojjat Emami. "A hybrid cryptographic and deep learning approach for IoT device security." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 4-B (2025): 1437–49. https://doi.org/10.47974/jdmsc-2289.
Full textChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade, and Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Full textResearcher. "THE IMPACT OF QUANTUM COMPUTING ON CRYPTOGRAPHIC SECURITY: CHALLENGES AND MITIGATION STRATEGIES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 764–72. https://doi.org/10.5281/zenodo.13383192.
Full textTharayil, Jose J., E. S. Karthik Kumar, and Neena Susan Alex. "Visual Cryptography Using Hybrid Halftoning." Procedia Engineering 38 (2012): 2117–23. http://dx.doi.org/10.1016/j.proeng.2012.06.254.
Full textSingh, Ranjeet Kumar. "A Hybrid Approach of Cryptography." International Journal of Social Ecology and Sustainable Development 14, no. 1 (2023): 1–19. http://dx.doi.org/10.4018/ijsesd.326758.
Full textLe, Anh-Thang, Thanh-Huyen Pham Thi, Van-Dong Vu, Mai-Thanh Hoang Thi, and Bich-Ngoc Nguyen Thi. "Hybrid affine cipher and eigenvector methods for cryptography." HPU2 Journal of Science: Natural Sciences and Technology 3, no. 3 (2024): 80–87. https://doi.org/10.56764/hpu2.jos.2024.3.3.80-87.
Full textAnitha Malaghan, Aditya M, Ajith B, Anjana S, and Karthik GPN. "Combined Steganography and Image Cryptography System for Secure Data Transfer." ACS Journal for Science and Engineering 2, no. 1 (2022): 63–72. http://dx.doi.org/10.34293/acsjse.v2i1.28.
Full textSubedar, Zuhi, and Araballi Ashwini. "Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication." International Journal of Mathematical Sciences and Computing 6, no. 4 (2020): 35–41. http://dx.doi.org/10.5815/ijmsc.2020.04.04.
Full textPeter Adeyemo Adepoju, Blessing Austin-Gabriel, Adebimpe Bolatito Ige, Nurudeen Yemi Hussain, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "Machine learning innovations for enhancing quantum-resistant cryptographic protocols in secure communication." Open Access Research Journal of Multidisciplinary Studies 4, no. 1 (2022): 131–39. https://doi.org/10.53022/oarjms.2022.4.1.0075.
Full textChokyi, Tenzin. "Secure File Storage on Cloud Using Hybrid Cryptography." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47521.
Full textDhiman, Oshin, and Anand Sharma. "Enhancement for Secured File Storage Using Modern Hybrid Cryptography." International Journal on Future Revolution in Computer Science & Communication Engineering 8, no. 1 (2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Full textSagar Ramesh Rane. "Quantum-Resistant Cryptographic Algorithms: A Comparative Analysis for Securing Next-Generation Communication Networks." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 725–31. https://doi.org/10.52783/jisem.v10i13s.2155.
Full textPratarshi, Saha, Gurung Sandeep, and Krishanu Ghose Kunal. "HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 163–79. https://doi.org/10.5281/zenodo.4724281.
Full textSingh, Pooja, and R. K. Chauhan. "A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 2232. http://dx.doi.org/10.11591/ijece.v7i4.pp2232-2240.
Full textBenaich, Rihab, Youssef Gahi, and Saida El Mendili. "Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework." Emerging Science Journal 9, no. 1 (2025): 161–87. https://doi.org/10.28991/esj-2025-09-01-010.
Full textRafiul Azim Jowarder and Sawgat Jahan. "Quantum computing in cyber security: Emerging threats, mitigation strategies, and future implications for data protection." World Journal of Advanced Engineering Technology and Sciences 13, no. 1 (2024): 330–39. http://dx.doi.org/10.30574/wjaets.2024.13.1.0421.
Full textPooja, Singh, and University Kurukshetra. "A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 2232–40. https://doi.org/10.11591/ijece.v7i4.pp2232-2240.
Full textTuhin Banerjee. "Post-quantum cryptography: Reshaping the future of identity and access management." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 350–56. https://doi.org/10.30574/wjaets.2025.15.2.0567.
Full textArabind Kumar. "Image Encryption and Decryption Algorithm Based on Chaotic Systems and RSA Cryptography." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 1348–58. https://doi.org/10.52783/cana.v32.4145.
Full textKumar, Dilip, and Manoj Kumar. "Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT." International Journal of Computer Network and Information Security 16, no. 2 (2024): 42–54. http://dx.doi.org/10.5815/ijcnis.2024.02.04.
Full textSa'idu, Sani, Taneja Prashansa, and Kalta Shreya. "A Comparative Analysis of Cryptographic Algorithms: AES & RSA and Hybrid Algorithmfor Encryption and Decryption." International Journal of Innovative Science and Research Technology 7, no. 8 (2022): 1725–32. https://doi.org/10.5281/zenodo.7095180.
Full textShaikh, Er Parvin, and Sonali Patil. "Performance Evaluation of Hybrid Cryptography System." International Journal of Engineering Trends and Technology 54, no. 4 (2017): 255–63. http://dx.doi.org/10.14445/22315381/ijett-v54p235.
Full textPRASAD, BANDHU. "FIBONACCI MATRICES AND HYBRID MATRIX CRYPTOGRAPHY." Discrete Mathematics, Algorithms and Applications 06, no. 01 (2014): 1450009. http://dx.doi.org/10.1142/s1793830914500098.
Full textDomathoti, Manasa, Sai Kowsik Ayyalasomayajula, Venkata Kishore Karri, and Lokesh M. "Hiding Data Using Efficient Combination of ECC And Compression Steganography Techniques." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42798.
Full textSaman Khan. "Enhancing Cloud Data Security using a Hybrid Cryptographic Model: A Combination of Advanced Encryption Standard and Elliptic Curve Cryptography." Journal of Information Systems Engineering and Management 10, no. 34s (2025): 01–13. https://doi.org/10.52783/jisem.v10i34s.5770.
Full textK. Aruna Kumari. "Cryptographic Algorithms and Computational Complexity: A Mathematical Approach to Securing IT Networks." Journal of Information Systems Engineering and Management 10, no. 25s (2025): 409–20. https://doi.org/10.52783/jisem.v10i25s.4037.
Full textSingh, Sumer. "StegaCrypt Integrating Hybrid Cryptography and Image Steganography." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 454–57. http://dx.doi.org/10.22214/ijraset.2024.65087.
Full textAbdulkhaleq, Ali H., Kareem K. Ibrahim, and Ahmed S. Abdulreda. "A hybrid cryptographic and steganography approach for secure IoT data transmission." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 4-B (2025): 1425–36. https://doi.org/10.47974/jdmsc-2288.
Full textAshok, Gudela, S. Ashok Kumar, D. Chaya Kumari, K. V. M. Vara Kumar, and Mathe Ramakrishna. "A new frontier in information security : Polynomial-Fibonacci hybrid cryptography." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): 1185–94. http://dx.doi.org/10.47974/jdmsc-1973.
Full textChandrakar, Yogita. "A Post-Quantum Secure and Covert Communication Framework: Hybrid Goppa Code-based Niederreiter Cryptosystem Integrated with LSB Image Steganography." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 07 (2025): 1–9. https://doi.org/10.55041/ijsrem51146.
Full textAbbood, Abdulnasser AbdulJabbar, Faris K. AL-Shammri, Zainab Marid Alzamili, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, and Rommel AlAli. "Investigating Quantum-Resilient Security Mechanisms for Flying Ad-Hoc Networks (FANETs)." Journal of Robotics and Control (JRC) 6, no. 1 (2025): 456–69. https://doi.org/10.18196/jrc.v6i1.25351.
Full textVenkataramanna, Ramya Kothur, Manjunatha Reddy Hosur Sriram, and Bharathi Chowda Reddy. "Advancing cryptography: a novel hybrid cipher design merging Feistel and SPN structures." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 751. http://dx.doi.org/10.11591/ijeecs.v35.i2.pp751-760.
Full textRamya, Kothur Venkataramanna Manjunatha Reddy Hosur Sriram Bharathi Chowda Reddy. "Advancing cryptography: a novel hybrid cipher design merging Feistel and SPN structures." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 751–60. https://doi.org/10.11591/ijeecs.v35.i2.pp751-760.
Full textShamshad, Shuhab, Farina Riaz, Rabia Riaz, Sanam Shahla Rizvi, and Shahab Abdulla. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors 22, no. 21 (2022): 8151. http://dx.doi.org/10.3390/s22218151.
Full textChia, Jason, Swee-Huay Heng, Ji-Jian Chin, Syh-Yuan Tan, and Wei-Chuen Yau. "An Implementation Suite for a Hybrid Public Key Infrastructure." Symmetry 13, no. 8 (2021): 1535. http://dx.doi.org/10.3390/sym13081535.
Full textSwapna, P., S. Fazila, K. Hanumanthu Naik, G. Amrutha vani, and B. Reddaiah. "Hybrid Cryptosystem Ensuring CIA Triad." International Journal of Engineering and Advanced Technology 12, no. 1 (2022): 50–53. http://dx.doi.org/10.35940/ijeat.a3841.1012122.
Full text