Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. N. D. Nathasia and a. E. Wicaksono, “Penerapan Teknik Kriptografi StreamCipher Untuk Pengaman Basis Data,” ICT Research Center UNAS. 2011.
    2. W. J. Buchanan, Cryptography. 2017.
    3. D. Ganguly and S. Lahiri, “Cryptography and Network Security,” in Network and Application Security, 2011.
    4. M. Agarwal, “Text Steganographic Approaches: A Comparison,” Int. J. Netw. Secur. Its Appl., 2013, doi: 10.5121/ijnsa.2013.5107.
    5. B. Vinayaga Sundaram, M. Ramnath, M. Prasanth, and J. Varsha Sundaram, “Encryption and hash based security in Internet of Things,” 2015, doi: 10.1109/ICSCN.2015.7219926.
    6. G. V. Bard, Algebraic cryptanalysis. 2009.
    7. A. U. Rahman, S. U. Miah, and S. Azad, “Advanced encryption standard,” in Practical Cryptography: Algorithms and Implementations Using C++, 2014.
    8. Y. Dodis, K. Haralambiev, A. López-Alt, and D. Wichs, “Efficient public-key cryptography in the presence of key leakage,” 2010, doi: 10.1007/978-3-642- 17373-8_35.
    9. Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, and I. You, “Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing,” Inf. Sci. (Ny)., 2017, doi: 10.1016/j.ins.2016.04.015.
    10. R. Tripathi and S. Agrawal, “Comparative Study of Symmetric and Asymmetric Cryptography,” Int. J. Adv. Found. Res. Comput., 2014.
    11. Y. Kumar, R. Munjal, and H. Sharma, “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures,” IJCSMS Int. J. Comput. Sci. Manag. Stud., 2011.
    12. M. Mogollon, Cryptography and Security Services. 2011.

Recent Article