Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Suriya kala.L, Dr. R. Thangaraj “A Study on different Image Encryption Algorithms” ,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, 1204-1206
    2. Swadeep Singh, Anupriya Garg, Anshul Sachdeva, “Comparision of Cryptograpic Algorithms ECC and RSA”, International Journal of Computer Science and Communication Engineering (IJCSC), Special issue on “Recent Advances in Engineering & Technology” NCRAET-2013, ISSN 2319-7080.
    3. Sahan Ahmad, Kazi Md. Rokibul Alam, Habibur Rahman, and Shinsuke Tamura, “A Comparison between Symmetric and Asymmetric Key Encryption Algorithm based Decryption Mixnets”, National Conference on Networkinh Systems and Security (NSysS), 2015, 978-1- 4799-8162-7/2015 IEEE
    4. P. Princy, “A Comparison of Symmetric Key Algorithms Des, Aes, Blowfish, Rc4, Rc6: A Survey”, International Journal of Computer Science & Engineering Technology (IJCSET) ISSN: 2229-3345 Vol. 6 No. 05 May 2015
    5. Tingyuan Nie and Teng Zhang, “A Study of DES and Blowfish Encryption Algorithm”, IEEE Region 10 Conference (TECHNO) IEEE, 2009.
    6. R.L. Rivest.”The RC5 encryption algorithm”. In B. Preneel, editor, Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, pages 86-96, 1995. Springer Verlag
    7. Neeta Wadhwa, Syed Zeeshan Hussain & S. A. M Rizvi, International Journal of Computer Science and Engineering (IJCSE) ISSN 2278-9960 Vol. 2, Issue 3, July 2013, 89-94
    8. V. Mnssvkr Gupta, K.V.S. Murthy, A. Yesubabu, R. Shiva A Shankar, “Recent performance evaluation among various AES algorithm- MARS, RC6, RIJNDAEL, SERPENT, TWOFISH”, International Journal of Science and Advanced Technology(IJSAT), 2012.
    9. Perlman, R. and Kaufman, C. “Key Exchange in IPSec: Analysis of IKE”, IEEE Internet Computing, Nov/Dec 2000.
    10. M. S. Hwang, C. C. Lee, and S. F. Tzeng, “A New Knapsack Public- Key Cryptosystem Based on Permutation Combination Algorithm”, International Journal of Applied Mathematics and Computer Sciences (IJAMCS) vol. 5; 1, pp. 33-38, Winter 2009.
    11. Pooja Natu, Prof. Shikha Pachouly “A Comparative Analysis of Provable Data Possession Schemes in Cloud”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (6), 2014, 7927-7931
    12. Xun Yi, Russell Paulet, Elisa Bertino 2014”Homomorphic Encryption and Applications”, SpringerBriefs in Computer Science, DOI 10.1007/978- 3-319-12229-8__2
    13. Payal V. Parmar, Shraddha B. Padhar, Shafika N. Patel, Niyatee I. Bhatt, Rutvij H. Jhaveri, “Survey of Various Homomorphic Encryption algorithms and Schemes”, International Journal of Computer Applications (0975 – 8887) Volume 91 – No.8, April 2014
    14. Prashanth Kumar Arya, Dr Mahendra Sing Aswal, Dr Vinod Kumar, “Comparative Study of Asymmetric Key Cryptographic Algorithms” International Journal of Computer Science & Communication Networks,Vol 5(1),17-21
    15. S. Nithya , Dr. E. George Dharma Prakash Raj, “ Survey on Asymmetric Key Cryptography Algorithms”, Journal of Advanced Computing and Communication Technologies(JACCT) (ISSN: 2347 - 2804) Volume No. 2 Issue No. 1, February 2014
    16. Yogesh Kumar, Rajiv Munjal, Harsh Sharma “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures” , IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011ISSN (Online): 2231-5268

Recent Article