Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference36 articles.
1. Paterson, K. G., Piper, F., & Schack, R. (2004). Why quantum cryptography? (No. quant-ph/0406147).
2. Portmann, C., & Renner, R. (2022). Security in quantum cryptography. Reviews of Modern Physics, 94(2), 025008.
3. Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, 1–11.
4. Rao, S. (2015). Performance analysis of DES and triple DES. International Journal of Computer Applications, 130(14), 30–24.
5. Alabaichi, A., Ahmad, F. & Mahmod, R. (2013). Security analysis of blowfish algorithm. In 2013 second international conference on informatics and applications (ICIA). pp. 12–18. IEEE.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献