Journal articles on the topic 'Symmetric encryption techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Symmetric encryption techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Parenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Full textMalhotra, Anoushka, Ashwin Arora, and Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Full textChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (2020): 5162. http://dx.doi.org/10.3390/s20185162.
Full textM, Sreekala, and Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC." International Journal of Emerging Research in Management and Technology 6, no. 7 (2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Full textPushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Full textKuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin, and Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.
Full textAhamad, Md Martuza, and Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia." Rajshahi University Journal of Science and Engineering 44 (November 19, 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Full textZhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Full textParveen Sehgal, Satinder ,. "Design a Hybrid Algorithm for Data Encryption to Implementation in Database." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 1328–37. http://dx.doi.org/10.52783/tjjpt.v44.i4.1037.
Full textUbaidullah, Mohammad, and Qahtan Makki. "A Review on Symmetric Key Encryption Techniques in Cryptography." International Journal of Computer Applications 147, no. 10 (2016): 43–48. http://dx.doi.org/10.5120/ijca2016911203.
Full textThomas, Ambili, and V. Lakshmi Narasimhan. "Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment." International Journal of Natural Computing Research 10, no. 2 (2021): 21–41. http://dx.doi.org/10.4018/ijncr.2021040102.
Full textParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Full textDhiman, Oshin, and Anand Sharma. "Enhancement for Secured File Storage Using Modern Hybrid Cryptography." International Journal on Future Revolution in Computer Science & Communication Engineering 8, no. 1 (2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Full textChandrakala B M, Latha A P, B. V. Shruti. "Optimizing the Application of Hybrid Cryptographic Methods for Secure File Storage and Retrieval." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 2126–33. http://dx.doi.org/10.52783/tjjpt.v44.i4.1191.
Full textBenyahia, Kadda, Meftah Mustapha, and Latreche Abdelkrim. "A Bio-Inspired Algorithm for Symmetric Encryption." International Journal of Organizational and Collective Intelligence 10, no. 1 (2020): 1–13. http://dx.doi.org/10.4018/ijoci.2020010101.
Full textAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Full textHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Full textJabir, Hawraa. "An Overview of Parallel Symmetric Cipher of Messages." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 31, no. 2 (2023): 19–33. http://dx.doi.org/10.29196/jubpas.v31i2.4652.
Full text., Sonika, Sandeep Kumar Arora, and Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network." International Journal of Engineering & Technology 7, no. 3.8 (2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Full textRabie, A., Kh El Shafie, A. Hammuoda, and M. Rohiem. "Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith." International Journal of Reconfigurable and Embedded Systems (IJRES) 9, no. 2 (2020): 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.
Full textAminudin, Nur, Andino Maseleno, Shankar K, et al. "Nur Algorithm on Data Encryption and Decryption." International Journal of Engineering & Technology 7, no. 2.26 (2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.26.14363.
Full textManiyath, Shima Ramesh, and Thanikaiselvan V. "A novel efficient multiple encryption algorithm for real time images." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Full textTumati, Gowtham, Yalamarthi Rajesh, Manogna T, and J. Ram Kumar. "A New Encryption Algorithm Using Symmetric Key Cryptography." International Journal of Engineering & Technology 7, no. 2.32 (2018): 436. http://dx.doi.org/10.14419/ijet.v7i2.32.15734.
Full textKuppuswamy, Prakash, and Dr Saeed Q Y Al-Khalidi. "IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (2012): 335–38. http://dx.doi.org/10.24297/ijct.v3i2c.2896.
Full textHe, Wei, Yu Zhang, and Yin Li. "Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search." Symmetry 14, no. 5 (2022): 1029. http://dx.doi.org/10.3390/sym14051029.
Full textGui, Zichen, Kenneth G. Paterson, Sikhar Patranabis, and Bogdan Warinschi. "SWiSSSE: System-Wide Security for Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 549–81. http://dx.doi.org/10.56553/popets-2024-0032.
Full textKour, Avleen. "Secure Authentication in Cloud Computing using Diffie Hellman and One Time Password." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 4375–80. http://dx.doi.org/10.22214/ijraset.2021.36037.
Full textHarba, E. S. I. "Secure Data Encryption Through a Combination of AES, RSA and HMAC." Engineering, Technology & Applied Science Research 7, no. 4 (2017): 1781–85. http://dx.doi.org/10.48084/etasr.1272.
Full textBerisha, Artan, and Hektor Kastrati. "Parallel impelementation of RC6 algorithm." Journal of Computer Science and Technology Studies 3, no. 2 (2021): 01–09. http://dx.doi.org/10.32996/jcsts.2021.3.2.1.
Full textVennela, Vasireddy. "Lightweight Cryptography Algorithms for IOT Devices." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 1678–83. http://dx.doi.org/10.22214/ijraset.2021.35358.
Full textDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti, and Shashank Singh. "Neural Network Based Message Concealment Scheme." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Full textRaja, S. P. "Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique." International Journal of Wavelets, Multiresolution and Information Processing 17, no. 05 (2019): 1950034. http://dx.doi.org/10.1142/s0219691319500346.
Full textVergoossen, Tom, Robert Bedington, James A. Grieve, and Alexander Ling. "Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded." Entropy 21, no. 4 (2019): 387. http://dx.doi.org/10.3390/e21040387.
Full textVerma, Saurav, Mahek Pokharna, and Vishal Mishra. "Identifying and analyzing Risk Mitigation strategies in IOT devices using Light Weight Symmetric Encryption Algorithms." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 638–46. http://dx.doi.org/10.22214/ijraset.2022.46697.
Full textKaushik, Bharti, Vikas Malik, and Vinod Saroha. "A Review Paper on Data Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.
Full textLai, Jian-Foo, and Swee-Huay Heng. "Secure File Storage On Cloud Using Hybrid Cryptography." Journal of Informatics and Web Engineering 1, no. 2 (2022): 1–18. http://dx.doi.org/10.33093/jiwe.2022.1.2.1.
Full textAlothman, Raya Basil, Imad Ibraheem Saada, and Basma Salim Bazel Al-Brge. "A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing." Journal of Cases on Information Technology 24, no. 2 (2022): 1–18. http://dx.doi.org/10.4018/jcit.20220101.oa1.
Full textPark, Juhyun, and Yongsu Park. "Symmetric-Key Cryptographic Routine Detection in Anti-Reverse Engineered Binaries Using Hardware Tracing." Electronics 9, no. 6 (2020): 957. http://dx.doi.org/10.3390/electronics9060957.
Full textBhandari, Ashok Singh. "Analysis of Computational Algebra for Cryptography and Coding Theory Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 598–606. http://dx.doi.org/10.17762/msea.v70i1.2513.
Full textYesin, V. I., and V. V. Vilihura. "Research on the main methods and schemes of encryption with search capability." Radiotekhnika, no. 209 (June 24, 2022): 138–55. http://dx.doi.org/10.30837/rt.2022.2.209.14.
Full textKovalchuk, A. M., Yuriy Peleckh, and Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES." Measuring Equipment and Metrology 83, no. 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.
Full textAdy Putra, Wahyu, Suyanto Suyanto, and Muhammad Zarlis. "Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security." SinkrOn 8, no. 2 (2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Full textSeelamanthula Sreenivasu, Et al. "DAR Model: A Novel Symmetric Key Enabled Security architecture for reliable data transfer in Wireless Sensor Networks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 717–28. http://dx.doi.org/10.17762/ijritcc.v11i10.8568.
Full textHanin, Charifa, Fouzia Omary, Souad Elbernoussi, Khadija Achkoun, and Bouchra Echandouri. "A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO)." International Journal of Information Security and Privacy 12, no. 4 (2018): 54–67. http://dx.doi.org/10.4018/ijisp.2018100104.
Full textAlmaiah, Mohammed Amin, Ziad Dawahdeh, Omar Almomani, Adeeb Alsaaidah, Ahmad Al-Khasawneh, and Saleh Khawatreh. "A new hybrid text encryption approach over mobile ad hoc network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 6461. http://dx.doi.org/10.11591/ijece.v10i6.pp6461-6471.
Full textJasim, Khalid F., Reem J. Ismail, Abdullah A. Nahi Al-Rabeeah, and Soma Solaimanzadeh. "Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of IoT Devices." Cihan University-Erbil Scientific Journal 5, no. 2 (2021): 13–19. http://dx.doi.org/10.24086/cuesj.v5n2y2021.pp13-19.
Full textSholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh, and Gilang Aji Setiawan. "Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security." Edu Komputika Journal 9, no. 1 (2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.
Full textWang, Peng, and Xiang Li. "TEDL: A Text Encryption Method Based on Deep Learning." Applied Sciences 11, no. 4 (2021): 1781. http://dx.doi.org/10.3390/app11041781.
Full textM. Subhashini, K. Shankar,. "Hybrid Encryption based Access Control Approach for Securing Cloud Computing." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1056–63. http://dx.doi.org/10.17762/ijritcc.v11i9.8998.
Full textChatterjee, Runa, Rajdeep Chakraborty, and Mondal J.K. "DESIGN OF LIGHTWEIGHT CRYPTOGRAPHIC MODEL FOR END-TO-END ENCRYPTION IN IOT DOMAIN." IRO Journal on Sustainable Wireless Systems 1, no. 04 (2019): 215–24. http://dx.doi.org/10.36548/jsws.2019.4.002.
Full text