Author:
Kumar Kishore,Tanwar Sarvesh,Kumar Shishir
Reference30 articles.
1. Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit;Shaik;MethodsX,2022
2. The dichotomy of neural networks and cryptography: war and peace;Zolfaghari;Appl. Syst. Innov.,2022
3. Neural Cryptography with Fog Computing Network for Health Monitoring Using IoMT;Ravikumar;Comput. Syst. Sci. Eng.,2023
4. A review on symmetric key encryption techniques in cryptography;Bokhari;Int. J. Comput. Appl.,2016
5. A comparative survey of symmetric and asymmetric key cryptography;Chandra,2014