Items where Subject is "Cryptography"

Group by: Creators | Item Type
Jump to: D | P | R | S | T
Number of items at this level: 9.

D

Deepa, M and Roshni Naveena, S and Harini, D N and Sravika, V and Soundarya, S and Reshma, S (2021) A Novel Electronic Medical Record Design Using Cryptography and Steganography Techniques. 2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA). pp. 377-382.

Deepa, M and Varssha, B and Abinaya, E and Ajitha, S and Dhaarani, S and Sharmila, K A (2023) An Efficient Implementation of AES Algorithm for Cryptography Using CADENCE. 2023 7th International Conference on Electronics, Communication and Aerospace Technology (ICECA). pp. 1478-1484.

P

Paldurai, K (2023) Comparison of Advanced Encryption Standard Variants Targeted at FPGA Architectures. In: Intelligent Systems and Machine Learning. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2022 . Springer, Singapore, pp. 346-355. ISBN 9783031350771

Prabhu, A (2019) Performance Analysis of Encryption Algorithms with Pat-Fish for Cloud Storage Security. In: Lecture Notes in Electrical Engineering. Springer, Singapore, pp. 111-120. ISBN 9789811310584

Priya Ponnuswamy, P and Sadhana, V and Shabariram, C P and Kanderi Yaghna, Chowdary and Sanju Revanth, A R (2024) Parallelizing Sieve of Eratosthenes Algorithm in Banking Application. 2024 International Conference on Smart Systems for Electrical, Electronics, Communication and Computer Engineering (ICSSEECC). pp. 392-397.

R

Rajaraja, R and Resma Madhu, P K and Susithra, N and Pradeepika, N and Gopika, G (2024) Resource Analysis of Lightweight Cryptography Algorithms for Compact Devices. 2024 International Conference on Smart Systems for Electrical, Electronics, Communication and Computer Engineering (ICSSEECC). pp. 579-584.

S

Santhiya, K (2023) Identification of Fingerprint Orientation Using Improved Generative Adversarial Network with Support Vector Machine. 2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC). pp. 1-5.

Subash Kumar, C S (2023) Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata. The Journal of Supercomputing, 79 (3). pp. 3024-3054. ISSN 0920-8542

T

Thivaharan, S (2023) A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol. Optik, 273. p. 170345. ISSN 00304026

This list was generated on Sat Jan 18 02:16:37 2025 IST.