Journal articles on the topic 'Symmetric encryption techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Symmetric encryption techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Parenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (February 16, 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Full textMalhotra, Anoushka, Ashwin Arora, and Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Full textChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (September 10, 2020): 5162. http://dx.doi.org/10.3390/s20185162.
Full textM, Sreekala, and Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC." International Journal of Emerging Research in Management and Technology 6, no. 7 (June 29, 2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Full textPushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Full textKuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin, and Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (April 1, 2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.
Full textAhamad, Md Martuza, and Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia." Rajshahi University Journal of Science and Engineering 44 (November 19, 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Full textZhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Full textParveen Sehgal, Satinder ,. "Design a Hybrid Algorithm for Data Encryption to Implementation in Database." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (October 16, 2023): 1328–37. http://dx.doi.org/10.52783/tjjpt.v44.i4.1037.
Full textUbaidullah, Mohammad, and Qahtan Makki. "A Review on Symmetric Key Encryption Techniques in Cryptography." International Journal of Computer Applications 147, no. 10 (August 16, 2016): 43–48. http://dx.doi.org/10.5120/ijca2016911203.
Full textThomas, Ambili, and V. Lakshmi Narasimhan. "Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment." International Journal of Natural Computing Research 10, no. 2 (April 2021): 21–41. http://dx.doi.org/10.4018/ijncr.2021040102.
Full textParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Full textDhiman, Oshin, and Anand Sharma. "Enhancement for Secured File Storage Using Modern Hybrid Cryptography." International Journal on Future Revolution in Computer Science & Communication Engineering 8, no. 1 (March 31, 2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Full textChandrakala B M, Latha A P, B. V. Shruti. "Optimizing the Application of Hybrid Cryptographic Methods for Secure File Storage and Retrieval." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (October 27, 2023): 2126–33. http://dx.doi.org/10.52783/tjjpt.v44.i4.1191.
Full textBenyahia, Kadda, Meftah Mustapha, and Latreche Abdelkrim. "A Bio-Inspired Algorithm for Symmetric Encryption." International Journal of Organizational and Collective Intelligence 10, no. 1 (January 2020): 1–13. http://dx.doi.org/10.4018/ijoci.2020010101.
Full textAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Full textHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (July 31, 2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Full textJabir, Hawraa. "An Overview of Parallel Symmetric Cipher of Messages." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 31, no. 2 (June 29, 2023): 19–33. http://dx.doi.org/10.29196/jubpas.v31i2.4652.
Full text., Sonika, Sandeep Kumar Arora, and Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network." International Journal of Engineering & Technology 7, no. 3.8 (July 7, 2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Full textRabie, A., Kh El Shafie, A. Hammuoda, and M. Rohiem. "Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith." International Journal of Reconfigurable and Embedded Systems (IJRES) 9, no. 2 (July 1, 2020): 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.
Full textAminudin, Nur, Andino Maseleno, Shankar K, S. Hemalatha, K. Sathesh kumar, Fauzi ., Rita Irviani, and Muhamad Muslihudin. "Nur Algorithm on Data Encryption and Decryption." International Journal of Engineering & Technology 7, no. 2.26 (May 7, 2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.26.14363.
Full textManiyath, Shima Ramesh, and Thanikaiselvan V. "A novel efficient multiple encryption algorithm for real time images." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Full textTumati, Gowtham, Yalamarthi Rajesh, Manogna T, and J. Ram Kumar. "A New Encryption Algorithm Using Symmetric Key Cryptography." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 436. http://dx.doi.org/10.14419/ijet.v7i2.32.15734.
Full textKuppuswamy, Prakash, and Dr Saeed Q Y Al-Khalidi. "IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (October 30, 2012): 335–38. http://dx.doi.org/10.24297/ijct.v3i2c.2896.
Full textHe, Wei, Yu Zhang, and Yin Li. "Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search." Symmetry 14, no. 5 (May 18, 2022): 1029. http://dx.doi.org/10.3390/sym14051029.
Full textGui, Zichen, Kenneth G. Paterson, Sikhar Patranabis, and Bogdan Warinschi. "SWiSSSE: System-Wide Security for Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (January 2024): 549–81. http://dx.doi.org/10.56553/popets-2024-0032.
Full textKour, Avleen. "Secure Authentication in Cloud Computing using Diffie Hellman and One Time Password." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4375–80. http://dx.doi.org/10.22214/ijraset.2021.36037.
Full textHarba, E. S. I. "Secure Data Encryption Through a Combination of AES, RSA and HMAC." Engineering, Technology & Applied Science Research 7, no. 4 (August 9, 2017): 1781–85. http://dx.doi.org/10.48084/etasr.1272.
Full textBerisha, Artan, and Hektor Kastrati. "Parallel impelementation of RC6 algorithm." Journal of Computer Science and Technology Studies 3, no. 2 (June 26, 2021): 01–09. http://dx.doi.org/10.32996/jcsts.2021.3.2.1.
Full textVennela, Vasireddy. "Lightweight Cryptography Algorithms for IOT Devices." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1678–83. http://dx.doi.org/10.22214/ijraset.2021.35358.
Full textDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti, and Shashank Singh. "Neural Network Based Message Concealment Scheme." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Full textRaja, S. P. "Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique." International Journal of Wavelets, Multiresolution and Information Processing 17, no. 05 (September 2019): 1950034. http://dx.doi.org/10.1142/s0219691319500346.
Full textVergoossen, Tom, Robert Bedington, James A. Grieve, and Alexander Ling. "Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded." Entropy 21, no. 4 (April 10, 2019): 387. http://dx.doi.org/10.3390/e21040387.
Full textVerma, Saurav, Mahek Pokharna, and Vishal Mishra. "Identifying and analyzing Risk Mitigation strategies in IOT devices using Light Weight Symmetric Encryption Algorithms." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 638–46. http://dx.doi.org/10.22214/ijraset.2022.46697.
Full textKaushik, Bharti, Vikas Malik, and Vinod Saroha. "A Review Paper on Data Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.
Full textLai, Jian-Foo, and Swee-Huay Heng. "Secure File Storage On Cloud Using Hybrid Cryptography." Journal of Informatics and Web Engineering 1, no. 2 (September 15, 2022): 1–18. http://dx.doi.org/10.33093/jiwe.2022.1.2.1.
Full textAlothman, Raya Basil, Imad Ibraheem Saada, and Basma Salim Bazel Al-Brge. "A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing." Journal of Cases on Information Technology 24, no. 2 (April 2022): 1–18. http://dx.doi.org/10.4018/jcit.20220101.oa1.
Full textPark, Juhyun, and Yongsu Park. "Symmetric-Key Cryptographic Routine Detection in Anti-Reverse Engineered Binaries Using Hardware Tracing." Electronics 9, no. 6 (June 8, 2020): 957. http://dx.doi.org/10.3390/electronics9060957.
Full textBhandari, Ashok Singh. "Analysis of Computational Algebra for Cryptography and Coding Theory Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 598–606. http://dx.doi.org/10.17762/msea.v70i1.2513.
Full textYesin, V. I., and V. V. Vilihura. "Research on the main methods and schemes of encryption with search capability." Radiotekhnika, no. 209 (June 24, 2022): 138–55. http://dx.doi.org/10.30837/rt.2022.2.209.14.
Full textKovalchuk, A. M., Yuriy Peleckh, and Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES." Measuring Equipment and Metrology 83, no. 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.
Full textAdy Putra, Wahyu, Suyanto Suyanto, and Muhammad Zarlis. "Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security." SinkrOn 8, no. 2 (April 6, 2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Full textSeelamanthula Sreenivasu, Et al. "DAR Model: A Novel Symmetric Key Enabled Security architecture for reliable data transfer in Wireless Sensor Networks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (November 2, 2023): 717–28. http://dx.doi.org/10.17762/ijritcc.v11i10.8568.
Full textHanin, Charifa, Fouzia Omary, Souad Elbernoussi, Khadija Achkoun, and Bouchra Echandouri. "A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO)." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 54–67. http://dx.doi.org/10.4018/ijisp.2018100104.
Full textAlmaiah, Mohammed Amin, Ziad Dawahdeh, Omar Almomani, Adeeb Alsaaidah, Ahmad Al-Khasawneh, and Saleh Khawatreh. "A new hybrid text encryption approach over mobile ad hoc network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6461. http://dx.doi.org/10.11591/ijece.v10i6.pp6461-6471.
Full textJasim, Khalid F., Reem J. Ismail, Abdullah A. Nahi Al-Rabeeah, and Soma Solaimanzadeh. "Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of IoT Devices." Cihan University-Erbil Scientific Journal 5, no. 2 (September 1, 2021): 13–19. http://dx.doi.org/10.24086/cuesj.v5n2y2021.pp13-19.
Full textSholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh, and Gilang Aji Setiawan. "Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security." Edu Komputika Journal 9, no. 1 (January 11, 2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.
Full textWang, Peng, and Xiang Li. "TEDL: A Text Encryption Method Based on Deep Learning." Applied Sciences 11, no. 4 (February 17, 2021): 1781. http://dx.doi.org/10.3390/app11041781.
Full textM. Subhashini, K. Shankar,. "Hybrid Encryption based Access Control Approach for Securing Cloud Computing." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (October 30, 2023): 1056–63. http://dx.doi.org/10.17762/ijritcc.v11i9.8998.
Full textChatterjee, Runa, Rajdeep Chakraborty, and Mondal J.K. "DESIGN OF LIGHTWEIGHT CRYPTOGRAPHIC MODEL FOR END-TO-END ENCRYPTION IN IOT DOMAIN." IRO Journal on Sustainable Wireless Systems 1, no. 04 (December 8, 2019): 215–24. http://dx.doi.org/10.36548/jsws.2019.4.002.
Full text