Performance Level Evaluation of Cryptographic Algorithms

@inproceedings{Parkar2021PerformanceLE,
  title={Performance Level Evaluation of Cryptographic Algorithms},
  author={Ashwini P. Parkar and M. Gedam and N. Ansari and Shanthi Therese},
  year={2021}
}

References

SHOWING 1-10 OF 12 REFERENCES
Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information Security
  • Sarika Y. Bonde, U. Bhadade
  • Computer Science
  • 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA)
  • 2017
  • 4
Brief review on journey of secured hash algorithms
  • 11
Comparative analysis of different techniques of encryption for secured data transmission
  • 12
To enhance consumer privacy and security for online shopping using MD5 algorithm
  • 4
Evaluating Performance of Symmetric Encryption Algorithms
  • Jaime Raigoza, Kapil Jituri
  • Computer Science
  • 2016 International Conference on Computational Science and Computational Intelligence (CSCI)
  • 2016
  • 109
Novel design of fast and compact SHA-1 algorithm for security applications
  • Ritu Kaur Makkad, A. Sahu
  • Computer Science
  • 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
  • 2016
  • 9
Performance analysis of encryption algorithms for security
  • M. Panda
  • Computer Science
  • 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES)
  • 2016
  • 35
An analysis and comparison for popular video encryption algorithms
  • 16
Implementation and Comparison of Two Hash Algorithms
  • Z. Wang, Lisha Cao
  • Computer Science
  • 2013 International Conference on Computational and Information Sciences
  • 2013
  • 14
...
1
2
...