2017 International Conference on Microelectronic Devices, Circuits and Systems (ICMDCS) 2017
DOI: 10.1109/icmdcs.2017.8211728
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid cryptography algorithm for cloud computing security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 51 publications
(14 citation statements)
references
References 1 publication
0
12
0
Order By: Relevance
“…Encryption for the cloud computing world is an important issue requiring investigation in several studies [8]. Jaber and Bin argue that an example of a significant focus area of encryption in cloud computing is identification based on encryption [9].…”
Section: Cryptographymentioning
confidence: 99%
“…Encryption for the cloud computing world is an important issue requiring investigation in several studies [8]. Jaber and Bin argue that an example of a significant focus area of encryption in cloud computing is identification based on encryption [9].…”
Section: Cryptographymentioning
confidence: 99%
“…According to [3], a hybrid system utilises the advantages of both asymmetric key and symmetric key encryption schemes. Blowfish symmetric algorithm is used in data encapsulation while RSA for encrypting the secret key and applying Digital Signature Algorithm (DSA).…”
Section: A Related Workmentioning
confidence: 99%
“…To accomplish the secure transmission for confidential data is the main aim of this proposed scheme. The combined structure of symmetric and asymmetric algorithms produces improved efficiency, and Security is increased to transmit data online by using the SHA-2 algorithm [8].Amalarethinam, I. G., & Leena, H. M. 2017proposed enhanced RSA (ERSA) algorithm by using two extra prime numbers in Standard RSA algorithm. By the utilization of prime numbers instead of random numbers in the proposed work enhanced speed of encryption and decryption.…”
Section: Related Workmentioning
confidence: 99%