Author:
Keserwani Pankaj Kumar,Govil Mahesh Chandra
Reference18 articles.
1. Agrawal, M., Mishra, P.: A comparative survey on symmetric key encryption techniques. Int. J. Comput. Sci. Eng. 4(5), 877 (2012)
2. Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L.: The Simon and Speck lightweight block ciphers. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6. IEEE (2015)
3. Chandra, S., Mandal, B., Alam, S.S., Bhattacharyya, S.: Content based double encryption algorithm using symmetric key cryptography. Procedia Comput. Sci. 57, 1228–1234 (2015)
4. Chandra, S., Paira, S., Alam, S.S., Sanyal, G.: A comparative survey of symmetric and asymmetric key cryptography. In: 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), pp. 83–93. IEEE (2014)
5. Chen, L., Zhou, S.: The comparisons between public key and symmetric key cryptography in protecting storage systems. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), vol. 4, pp. V4–494. IEEE (2010)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Low-Cost Energy Efficient Encryption Algorithm for Portable Device;Proceedings of the Fourth International Conference on Trends in Computational and Cognitive Engineering;2023
2. Introduction to Classical Cryptography;Quantum Blockchain;2022-07-15
3. Cloud computing platform: Performance analysis of prominent cryptographic algorithms;Concurrency and Computation: Practice and Experience;2022-03-13