Open Access
Issue
E3S Web Conf.
Volume 556, 2024
International Conference on Recent Advances in Waste Minimization & Utilization-2024 (RAWMU-2024)
Article Number 01048
Number of page(s) 11
DOI https://doi.org/10.1051/e3sconf/202455601048
Published online 09 August 2024
  1. Mathur, Nishtha, and Rajesh Bansode. "AES based text encryption using 12 rounds with dynamic key selection." Procedia computer science 79 (2016): 1036-1043. [CrossRef] [Google Scholar]
  2. Saraf, K.K., et al. "Text Encryption and Decryption using AES Algorithm." Int. J. Electron., Elect. Comput. Syst. 7.3 (2018): 638-643. [Google Scholar]
  3. Deshmukh, Priya. "An image encryption and decryption using AES algorithm." International Journal of Scientific & Engineering Research 7.2 (2016): 210-213. [Google Scholar]
  4. Rani, Dr N. Suba, D.A.N.M. Juliet, and K. Renuka Devi. "An image encryption & decryption and comparison with text-AES algorithm." International Journal of Scientific & Technology Research 8.7 (2019): 668-673. [Google Scholar]
  5. Harkanson, Russell, and Yoohwan Kim. "Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications." Proceedings of the 12th annual conference on cyber and information security research. 2017. K. Keerthi and B. Surendiran, [Google Scholar]
  6. Keerthi, K., and B. Surendiran. "Elliptic curve cryptography for secured text encryption." 2017 International Conference on Circuit, Power and Computing Technologies (iCcPCT). IEEE, 2017. [Google Scholar]
  7. Banerjee, Soumi, and Anita Patil. "ECC based encryption algorithm for lightweight cryptography." Intelligent Systems Design and Applications: 18th International Conference on Intelligent Systems Design and Applications (ISDA 2018) held in Vellore, India, December 6-8, 2018, Volume 1. Springer International Publishing, 2020. [Google Scholar]
  8. Iyer Sridhar, C., R.R. Sedamkar, and Shiwani Gupta. "A novel idea on multimedia encryption using hybrid crypto approach." Procedia Computer Science 79 (2016): 293-298. [CrossRef] [Google Scholar]
  9. Iyer Sridhar, C., R.R. Sedamkar, and Shiwani Gupta. "An Efficient Multimedia Encryption using Hybrid Crypto Approaches." IJRTER, ISSN (2016): 2455-1457. [Google Scholar]
  10. Ameta, Divija, and Sandeep Upadhyay. "A hybrid approach for image encryption using different number iterations in ECC and AES techniques." Int J Comp Appl (0975-8887) 175.3 (2017): 10-12. [Google Scholar]
  11. Gupta, Surbhi, Neha Goyal, and Kirti Aggarwal. "A review of comparative study of md5 and ssh security algorithm." International Journal of Computer Applications 104.14 (2014). [Google Scholar]
  12. Seth, Shashi Mehrotra, and Rajan Mishra. "Comparative analysis of encryption algorithms for data communication." Ijcst 2.2 (2011): 292-294. [Google Scholar]
  13. Mandal, Pratap Chnadra. "Superiority of blowfish algorithm." International Journal of Advanced Research in Computer Science and Software Engineering 2.9 (2012): 196-201. [Google Scholar]
  14. Apoorva, Yogesh Kumar. "Comparative study of different symmetric key cryptography algorithms." International Journal of Application or Innovation in Engineering & Management (IJAIEM) 2.7 (2013): 10-15. [Google Scholar]
  15. Elminaam, Diaa Salama Abdul, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud. "Performance evaluation of symmetric encryption algorithms." IJCSNS International Journal of Computer Science and Network Security 8.12 (2008): 280-286. [Google Scholar]
  16. Thakur, Jawahar, and Nagesh Kumar. "DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis." International journal of emerging technology and advanced engineering 1.2 (2011): 6-12. [Google Scholar]
  17. Hercigonja, Zoran. "Comparative analysis of cryptographic algorithms." International Journal of Digital Technology & Economy 1.2 (2016): 127-134. [Google Scholar]
  18. Mitali, Vijay Kumar, and Arvind Sharma. "A survey on various cryptography techniques." International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 3.4 (2014): 307-312. [Google Scholar]
  19. Pavithra, S. "Performance evaluation of symmetric algorithms." Journal of Global Research in Computer Science 3.8 (2012): 43-45. [Google Scholar]
  20. Ahmed, Diaa EM, and Othman O. Khalifa. "Robust and secure image steganography based on elliptic curve cryptography." 2014 International Conference on Computer and Communication Engineering. IEEE, 2014. [Google Scholar]
  21. Jirwan, Nitin, Ajay Singh, and Sandip Vijay. "Review and analysis of cryptography techniques." International Journal of Scientific & Engineering Research 4.3 (2013): 1-6. [Google Scholar]
  22. Tayal, Sandeep, et al. "A review paper on network security and cryptography." Advances in Computational Sciences and Technology 10.5 (2017): 763-770. [Google Scholar]
  23. Walia, Anjula Gupta Navpreet Kaur. "Cryptography Algorithms: A Review." International Journal of Engineering Development and Research 146 (2014). [Google Scholar]
  24. Callas, Jon. "The future of cryptography." Information Systems Security 16.1 (2007): 15-22. [CrossRef] [Google Scholar]
  25. Sharma, Harshit, Rakesh Kumar, and Meenu Gupta. "A Review Paper on Hybrid Cryptographic Algorithms in Cloud Network." 2023 2nd International Conference for Innovation in Technology (INOCON). IEEE, 2023. [Google Scholar]
  26. Musa, Ugbedeojo, et al. "Hybrid Cloud Storage Techniques Using Rsa And Ecc." 2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG). Vol. 1. IEEE, 2023. [Google Scholar]
  27. Bhat, Sourabh, and Vivek Kapoor. "Secure and efficient data privacy, authentication and integrity schemes using hybrid cryptography." International Conference on Advanced Computing Networking and Informatics: ICANI-2018. Springer Singapore, 2019. [Google Scholar]
  28. Prabhakar, P.K., Singh, K., Kabra, D. and Gupta, J., Natural SIRT1 modifiers as promising therapeutic agents for improving diabetic wound healing. Phytomedicine, 76, p. 153252, 2020. [CrossRef] [PubMed] [Google Scholar]
  29. Verma, Vyom, et al. "A novel approach for security in cloud data storage using aes-des-rsa hybrid cryptography." 2021 Emerging Trends in Industry 4.0 (ETI 4.0). IEEE, 2021. [Google Scholar]
  30. Behl, Ritin, Sachi Pandey, and Amit Sinha. "An Hybrid Approach to Insure Data Integrity on Outsourced Data using Symmetric Key Cryptography." 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. [Google Scholar]
  31. William, P., et al. "Assessment of hybrid cryptographic algorithm for secure sharing of textual and pictorial content." 2022 International conference on electronics and renewable systems (ICEARS). IEEE, 2022. [Google Scholar]
  32. Mishra, Y., Amin, H.I.M., Mishra, V., Vyas, M., Prabhakar, P.K., Gupta, M., Kanday, R., Sudhakar, K., Saini, S., Hromić-Jahjefendić, A. and Aljabali, A.A., 2022. Application of nanotechnology to herbal antioxidants as improved phytomedicine: An expanding horizon. Biomedicine & Pharmacotherapy, 153, p. 113413, 2022. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.