2022
DOI: 10.1007/978-3-030-98015-3_49
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Literature Review: The Taxonomy of Hybrid Cryptography Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…Kumar and Saxena [6] have implemented nested levels of cryptography with the help of AES, RSA and genetic algorithm. El-Douh et al [7] have discussed classification of hybrid cryptography in respective of model based and domain of application.…”
Section: Related Workmentioning
confidence: 99%
“…Kumar and Saxena [6] have implemented nested levels of cryptography with the help of AES, RSA and genetic algorithm. El-Douh et al [7] have discussed classification of hybrid cryptography in respective of model based and domain of application.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed scheme [17] improves security measures using both symmetric and asymmetric cryptosystems. A two-dimensional classification of existing studies on hybrid cryptography models based on processing phase and scope is presented in [18]. As a result, we can compare the study with other current models that help improve the performance of hybrid models after this COVID-19 pandemic.…”
Section: Fig 2 Examples Of Symmetric Elliptic Curvesmentioning
confidence: 99%
“…. Asymmetric or public key cryptography refers to crypto-systems where keys used for encryption and decryption operations are not the same but still present a mathematical complementary property [22]. The idea revolves around the fact that each node possesses two keys, a public one which can be known by every entity on the network and which is used to cipher messages in destination of the node, and its complementary one which is private and known only by the node, used for message decryption.…”
Section: Public Key Infrastructurementioning
confidence: 99%