[go: up one dir, main page]

Biswas et al., 2020 - Google Patents

Exploring network security using Vigenere Multiplicative cipher encryption and implementation

Biswas et al., 2020

View PDF
Document ID
8417740768155612488
Author
Biswas M
Sakeef N
Siddique H
Publication year

External Links

Snippet

Various types of encryption technologies have been used for many years to protect information. The purpose of this article is to create a new method called Vigenere- Multiplicative cipher. Here we develop an algorithm and its algebraic description. In addition …
Continue reading at assets-eu.researchsquare.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US20220385644A1 (en) Sharing encrypted items with participants verification
Mathur et al. Solving security issues in mobile computing using cryptography techniques—A Survey
EP1079565A2 (en) Method of securely establishing a secure communication link via an unsecured communication network
Khatarkar et al. A survey and performance analysis of various RSA based encryption techniques
Banoth et al. An introduction to classical and modern cryptography
Yeboah-Ofori et al. Applied cryptography in network systems security for cyberattack prevention
Kanaga Priya et al. Various attacks on the implementation of cryptographic algorithms
Daddala et al. Design and implementation of a customized encryption algorithm for authentication and secure communication between devices
Biswas et al. Exploring network security using Vigenere Multiplicative cipher encryption and implementation
Onwutalobi Overview of cryptography
Rahad et al. A study on network security services with cryptography and an implementation of vigenere-multiplicative cipher
US20240214187A1 (en) System and Method of Creating Symmetric Keys Using Elliptic Curve Cryptography
Arvin S. Lat et al. SOUL System: secure online USB login system
Vandenwauver Introduction to Cryptography
Chandurkar et al. Case Study on Cryptography
Saravanan et al. A Review Paper on Cryptography-Science of Secure Communication
Guru et al. A study of Cryptography to protect data from cyber-crimes
Biswas THE ROLE OF CRYPTOGRAPHY TOWARDS NETWORK SECURITY
Malluh et al. A highly secure quantum communication scheme for Blind Signature using qubits and qutrits
Xu et al. Research on the Data Security Enhancement Method Based on Encryption Paradigm
Sapkal DESIGN AND DEVELOPMENT OF AN ATTACK-RESISTANT IOT CLOUD CONVERGENCE ALGORITHM USING ATTRIBUTE-BASED ENCRYPTION
Madhukar Cryptography technology with network security
Singh et al. CHAT SIMULATOR USING AES ENCRYPTION
Rayapati et al. Security in Cloud Technologies: A Brief Overview
SINGH et al. STUDY ON NETWORKING ATTACKS AND SECURITY ALGORITHMS.