Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 21
Page No. 5527 - 5532

An Overview and Comparison of Various Cryptography Algorithms

Authors : Kritagya Sharma and Poonam Kumari

References

At, N., J.L. Beuchat, E. Okamoto, I. San and T. Yamazaki, 2014. Compact hardware implementations of ChaCha, BLAKE, Threefish and skein on FPGA. IEEE. Trans. Circuits Syst. Regul. Pap., 61: 485-498.
CrossRef  |  Direct Link  |  

Bhanot, R. and R. Hans, 2015. A review and comparative analysis of various encryption algorithms. Intl. J. Secur. Appl., 9: 289-306.
Direct Link  |  

Bisht, N. and S. Singh, 2015. A comparative study of some symmetric and asymmetric key cryptography algorithms. Intl. J. Innovative Res. Sci. Eng. Technol., 4: 1028-1031.
Direct Link  |  

Farash, M.S., O. Nawaz, K. Mahmood, S.A. Chaudhry and M.K. Khan, 2016. A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. J. Med. Syst., 40: 165-165.
Direct Link  |  

Hingmire, A., S. Ojha, C. Jain and K. Thombare, 2016. Image steganography using adaptive b45 algorithm combined with Pre-processing by twofish encryption. Intl. Educ. Sci. Res. J., 2: 11-12.
Direct Link  |  

Hossain, E.M.S., K.M.R. Alam, M.R. Biswasa and Y. Morimoto, 2016. A DNA cryptographic technique based on dynamic DNA sequence table. Proceedings of the 19th International Conference on Computer and Information Technology (ICCIT) 2016, December 18-20, 2016, IEEE, Khulna, Bangladesh, ISBN:978-1-5090-4091-9, pp: 270-275.

Jayashree, M., I. Poonguzhali and S.S. Agnes, 2016. An efficient high throughput implementation of IDEA encryption algorithm using VLSI. Aust. J. Basic Appl. Sci., 10: 337-344.
Direct Link  |  

Jun, B. and P. Kocher, 1999. The intel random number generator. Cryptography Research, San Francisco, California. http://decuslib.com/decus/vmslt99a/sec/intelrng.pdf

Kaushik, S. and A. Singhal, 2012. Network security using cryptographic techniques. Intl. J. Adv. Res. Comput. Sci. Software Eng., 2: 105-107.
Direct Link  |  

McGrew, D., D. Bailey, M. Campagna and R. Dugal, 2014. AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. Internet Eng. Task Force, 1: 1-10.
CrossRef  |  Direct Link  |  

Mellu, P. and S. Mali, 2011. AES: Asymmetric key cryptographic system. Intl. J. Inf. Technol. Knowl. Manage., 4: 113-117.

Ramaiya, M.K., N. Hemrajani and A.K. Saxena, 2013. Security improvisation in image steganography using DES. Proceedings of the IEEE 3rd International Conference on Advance Computing (IACC) 2013, February 22-23, 2013, IEEE, Jaipur, India, ISBN:978-1-4673-4527-9, pp: 1094-1099.

Ramaraj, A., N. Laitha and S. Karthikeyan, 2006. An analysis of key management in cryptographic algorithms. Asia J. Inform. Technol., 5: 963-967.
Direct Link  |  

Reddy, P.D.K., R.P. Sam and C.S. Bindu, 2016. Optimal blowfish algorithm-based technique for data security in cloud. Intl. J. Bus. Intell. Data Min., 11: 171-189.
CrossRef  |  Direct Link  |  

Shehata, K., H. Hussien and S. Yehia, 2014. FPGA implementation of RSA encryption algorithm for E-passport application. World Acad. Sci. Eng. Technol. Intl. J. Comput. Electr. Autom. Control Inf. Eng., 8: 82-85.
Direct Link  |  

Singh, K.P. and S. Parmar, 2015. Design of high performance MIPS cryptography processor based on T-DES algorithm. Intl. J. Eng. Res. Technol., 1: 1-6.
Direct Link  |  

Singh, S., S.K. Maakar and S. Kumar, 2013. A performance analysis of DES and RSA cryptography. Intl. J. Emerging Trends Technol. Comput. Sci. IJETTCS., 2: 418-423.
Direct Link  |  

Soni, S., H. Agrawal and M. Sharma, 2012. Analysis and comparison between AES and DES cryptographic algorithm. Intl. J. Eng. Innovative Technol., 2: 362-365.
Direct Link  |  

Suresh, S., M. Varghese and D. Aju, 2015. An efficient and optimized RC5 image encryption algorithm for secured image transmission. Intl. J. Imaging Rob., 15: 116-125.
Direct Link  |  

Verma, A., P. Guha and S. Mishra, 2016. Comparative study of different cryptographic algorithms. Intl. J. Emerging Trends Technol. Comput. Sci. IJETTCS., 5: 58-63.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved