Java library designed to work with elliptic curves Journal title: Modern Innovations, Systems and Technologies Authors: V. D. Khazieva Subject(s): Engineering, Environmental Sciences, Materials Science, Management Information Systems, Technological Change, Control Systems, Control and Optimization, Innovation
Salp Swarm Algorithm to solve Cryptographic Key Generation problem for Cloud computing Journal title: International Journal of Experimental Research and Review Authors: Waseem Kaleem, Mohammad Sajid, Ranjit Rajak Subject(s): Cattle, Dairy processing. Dairy products, Biological Sciences, Chemistry, Computer and Information Science, Mathematics, Miscellaneous, Medical Education
Prevention of VM Timing side-channel attack in a cloud environment using randomized timing approach in AES – 128 Journal title: International Journal of Experimental Research and Review Authors: Animesh Kumar, Sandip Dutta, Prashant Pranav Subject(s): Cattle, Dairy processing. Dairy products, Biological Sciences, Chemistry, Computer and Information Science, Mathematics, Miscellaneous, Medical Education
A Novel Cryptographic Technique for Cloud Environment Based on Feedback DNA Journal title: International Journal of Experimental Research and Review Authors: Nadia Sharfuddin, Faisal Anwer, Salman Ali Subject(s): Cattle, Dairy processing. Dairy products, Biological Sciences, Chemistry, Computer and Information Science, Mathematics, Miscellaneous, Medical Education
DNA Linear Block Codes: Generation, Error-Detection, and Error-Correction of DNA Codeword Journal title: International Journal of Bioinformatics and Intelligent Computing Authors: Mandrita Mondal, Kumar S. Ray Subject(s): Bioinformatics, Biotechnology, Artificial Intelligence, Mathematical & Computational Biology
Review on DNA Cryptography Journal title: International Journal of Bioinformatics and Intelligent Computing Authors: Mandrita Mondal, Kumar S. Ray Subject(s): Bioinformatics, Biotechnology, Artificial Intelligence, Mathematical & Computational Biology
Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA Journal title: Electronic and Cyber Defense Authors: Mohammad Ghafari,Hatam Abdoli,Mahdi Abbasi, Subject(s): Telecommunications, Electronic and Electrical Engineering, Computer Science, Interdisciplinary Applications, Computer Science, Cybernetics
The Application Of Encryption And Decryption To The Delivery Of Text Messages Using The Rc4 Algorithm (Rivest Code 4) Utilizes The Lsb (Least Of Significant Bit) Algorithm As An Insertion Into The Image Journal title: International Journal of Health, Engineering and Technology Authors: Al Boy In,Achmad Fauzi ,Hermansyah Sembiring, Subject(s): Engineering, Technology, Health science
A Password and Least Significant Bit Substitution Based Steganography Technique for Image Hiding Journal title: International Journal of Innovative Research in Computer Science and Technology Authors: Unmesh Mandal, Diotima Nag, Goutam Das, Rimpi Saha Subject(s): Electrical and Electronic Engineering, Chemical Engineering, Civil Engineering, Computer Science, Artificial Intelligence, Computer Science, Information Systems, Computer Science, Interdisciplinary Applications, Engineering, Multidisciplinary, Engineering, Civil, Computer Science, Cybernetics, Computer Science, Theory & Methods, Computer Science, Software Engineering
Enhancement of Security in Wireless Sensor Network by Using Trust Evaluation and TCP/IP Based Technology Journal title: International Journal of Innovative Research in Computer Science and Technology Authors: Rahul Das, Dr. Mona Dwivedi Subject(s): Electrical and Electronic Engineering, Chemical Engineering, Civil Engineering, Computer Science, Artificial Intelligence, Computer Science, Information Systems, Computer Science, Interdisciplinary Applications, Engineering, Multidisciplinary, Engineering, Civil, Computer Science, Cybernetics, Computer Science, Theory & Methods, Computer Science, Software Engineering
A Comprehensive Study on Digital Signature Journal title: International Journal of Innovative Research in Computer Science and Technology Authors: J. Chandrashekhara, Anu V B, Prabhavathi H, Ramya B R Subject(s): Electrical and Electronic Engineering, Chemical Engineering, Civil Engineering, Computer Science, Artificial Intelligence, Computer Science, Information Systems, Computer Science, Interdisciplinary Applications, Engineering, Multidisciplinary, Engineering, Civil, Computer Science, Cybernetics, Computer Science, Theory & Methods, Computer Science, Software Engineering
Multi-Layered Security System Using Cryptography and Steganography Journal title: International Journal of Innovative Research in Computer Science and Technology Authors: Mahima N, Noor Siddiqa, Tanvir Habib Sardar Subject(s): Electrical and Electronic Engineering, Chemical Engineering, Civil Engineering, Computer Science, Artificial Intelligence, Computer Science, Information Systems, Computer Science, Interdisciplinary Applications, Engineering, Multidisciplinary, Engineering, Civil, Computer Science, Cybernetics, Computer Science, Theory & Methods, Computer Science, Software Engineering
Methods for Protection of Key in Private Key Cryptography Journal title: International Journal of Innovative Research in Computer Science and Technology Authors: NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav Subject(s): Electrical and Electronic Engineering, Chemical Engineering, Civil Engineering, Computer Science, Artificial Intelligence, Computer Science, Information Systems, Computer Science, Interdisciplinary Applications, Engineering, Multidisciplinary, Engineering, Civil, Computer Science, Cybernetics, Computer Science, Theory & Methods, Computer Science, Software Engineering
A Strong Blind Signature Using Cascade Blind Factors Journal title: International Journal of Innovative Research in Computer Science and Technology Authors: Ayman A.Rahim A.Rahman, Abdulameer Hussain Subject(s): Electrical and Electronic Engineering, Chemical Engineering, Civil Engineering, Computer Science, Artificial Intelligence, Computer Science, Information Systems, Computer Science, Interdisciplinary Applications, Engineering, Multidisciplinary, Engineering, Civil, Computer Science, Cybernetics, Computer Science, Theory & Methods, Computer Science, Software Engineering
Providing Information Security Using Public Key Cryptosystems Journal title: International Journal of Innovative Research in Computer Science and Technology Authors: Mr D.Shiva rama krishna, Mr K.Siva Rama Prasad, Mr Ch.v.v.Narasimha Raju Subject(s): Electrical and Electronic Engineering, Chemical Engineering, Civil Engineering, Computer Science, Artificial Intelligence, Computer Science, Information Systems, Computer Science, Interdisciplinary Applications, Engineering, Multidisciplinary, Engineering, Civil, Computer Science, Cybernetics, Computer Science, Theory & Methods, Computer Science, Software Engineering