2018
DOI: 10.1007/978-981-13-2285-3_48
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Study of Cryptographic Algorithms for Cloud Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…In this cryptographic technique, each user has both private and public keys. The certain client only knew the private key; at the same time, the public key is delivered to all users for the efficient communication environment [18, 19]. Whilst a set of predefined constants are used by the other public‐key algorithm and also the predefined constants are mostly known by all users as well as devices that take part in the communication [7, 20].…”
Section: Introductionmentioning
confidence: 99%
“…In this cryptographic technique, each user has both private and public keys. The certain client only knew the private key; at the same time, the public key is delivered to all users for the efficient communication environment [18, 19]. Whilst a set of predefined constants are used by the other public‐key algorithm and also the predefined constants are mostly known by all users as well as devices that take part in the communication [7, 20].…”
Section: Introductionmentioning
confidence: 99%