Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. S. Jaryal, N. Kaur, and S. Sharma, ‘Image Encryption Technique Based on Hybridized DNA Cryptography and Compressive Sensing Algorithm’, in Communications in Computer and Information Science, 2019.
    2. N. D. Nathasia and a. E. Wicaksono, ‘Penerapan Teknik Kriptografi StreamCipher Untuk Pengaman Basis Data’, ICT Research Center UNAS. 2011.
    3. W. J. Buchanan, Cryptography. 2017.
    4. D. Ganguly and S. Lahiri, ‘Cryptography and Network Security’, in Network and Application Security, 2011.
    5. M. Agarwal, ‘Text Steganographic Approaches: A Comparison’, Int. J. Netw. Secur. Its Appl., 2013.
    6. B. Vinayaga Sundaram, M. Ramnath, M. Prasanth, and J. Varsha Sundaram, ‘Encryption and hash based security in Internet of Things’, in 2015 3rd International Conference on Signal Processing, Communication and Networking, ICSCN 2015, 2015.
    7. G. V. Bard, Algebraic cryptanalysis. 2009.
    8. A. U. Rahman, S. U. Miah, and S. Azad, ‘Advanced encryption standard’, in Practical Cryptography: Algorithms and Implementations Using C++, 2014.
    9. Y. Dodis, K. Haralambiev, A. López-Alt, and D. Wichs, ‘Efficient public-key cryptography in the presence of key leakage’, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010.
    10. Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, and I. You, ‘Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing’, Inf. Sci. (Ny)., 2017.
    11. R. Tripathi and S. Agrawal, ‘Comparative Study of Symmetric and Asymmetric Cryptography’, Int. J. Adv. Found. Res. Comput., 2014.
    12. Y. Kumar, R. Munjal, and H. Sharma, ‘Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures’, IJCSMS Int. J. Comput. Sci. Manag. Stud., 2011
    13. M. Mogollon, Cryptography and Security Services. 2011.

Recent Article