Author:
Jyothi E. V. N.,Masthan Kaja,Kranthi Maddala
Publisher
Springer Nature Singapore
Reference5 articles.
1. Garg N, Yadav P (2014) Comparison of asymmetric algorithms in cryptography. J Comp Sci Mob Comput (IJCSMC) 3(4):1190–1196
2. Timothy DP, Santra AK (2017, Aug) A hybrid cryptography algorithm for cloud computing security. In: 2017 International conference on microelectronic devices, circuits and systems (ICMDCS). IEEE, pp 1–5
3. Maqsood F, Ahmed M, Ali MM, Shah MA (2017) Cryptography: a comparative analysis for modern techniques. Int J Adv Comput Sci Appl 8(6):442–448
4. Jimbo K, Iriyama S, Regoli M (2020) Implementation of a new strongly-asymmetric algorithm and its optimization. Cryptography 4(3):21
5. Sann Z, Soe T, Knin K, Win Z (2019) Performance comparison of asymmetric cryptography (case study-mail message). APTIKOM J Comp Sci Inf Technol 4(3):105–111