Biswas et al., 2020 - Google Patents
Exploring network security using Vigenere Multiplicative cipher encryption and implementationBiswas et al., 2020
View PDF- Document ID
- 8417740768155612488
- Author
- Biswas M
- Sakeef N
- Siddique H
- Publication year
External Links
Snippet
Various types of encryption technologies have been used for many years to protect information. The purpose of this article is to create a new method called Vigenere- Multiplicative cipher. Here we develop an algorithm and its algebraic description. In addition …
- 238000000034 method 0 description 11
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220385644A1 (en) | Sharing encrypted items with participants verification | |
Mathur et al. | Solving security issues in mobile computing using cryptography techniques—A Survey | |
EP1079565A2 (en) | Method of securely establishing a secure communication link via an unsecured communication network | |
Khatarkar et al. | A survey and performance analysis of various RSA based encryption techniques | |
Banoth et al. | An introduction to classical and modern cryptography | |
Yeboah-Ofori et al. | Applied cryptography in network systems security for cyberattack prevention | |
Kanaga Priya et al. | Various attacks on the implementation of cryptographic algorithms | |
Daddala et al. | Design and implementation of a customized encryption algorithm for authentication and secure communication between devices | |
Biswas et al. | Exploring network security using Vigenere Multiplicative cipher encryption and implementation | |
Onwutalobi | Overview of cryptography | |
Rahad et al. | A study on network security services with cryptography and an implementation of vigenere-multiplicative cipher | |
US20240214187A1 (en) | System and Method of Creating Symmetric Keys Using Elliptic Curve Cryptography | |
Arvin S. Lat et al. | SOUL System: secure online USB login system | |
Vandenwauver | Introduction to Cryptography | |
Chandurkar et al. | Case Study on Cryptography | |
Saravanan et al. | A Review Paper on Cryptography-Science of Secure Communication | |
Guru et al. | A study of Cryptography to protect data from cyber-crimes | |
Biswas | THE ROLE OF CRYPTOGRAPHY TOWARDS NETWORK SECURITY | |
Malluh et al. | A highly secure quantum communication scheme for Blind Signature using qubits and qutrits | |
Xu et al. | Research on the Data Security Enhancement Method Based on Encryption Paradigm | |
Sapkal | DESIGN AND DEVELOPMENT OF AN ATTACK-RESISTANT IOT CLOUD CONVERGENCE ALGORITHM USING ATTRIBUTE-BASED ENCRYPTION | |
Madhukar | Cryptography technology with network security | |
Singh et al. | CHAT SIMULATOR USING AES ENCRYPTION | |
Rayapati et al. | Security in Cloud Technologies: A Brief Overview | |
SINGH et al. | STUDY ON NETWORKING ATTACKS AND SECURITY ALGORITHMS. |