2018
DOI: 10.1007/978-981-13-2372-0_14
|View full text |Cite
|
Sign up to set email alerts
|

Effective Data Storage Security with Efficient Computing in Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…However, although it is not considered very secure [ 8 ], RC4 continues to motivate research nowadays [ 8 , 9 , 10 ]. Furthermore, this cipher is a good option to measure the effectiveness of methods that analyze weaknesses in stream ciphers related to those already known in RC4 [ 11 , 12 , 13 , 14 ], or to check the performance of hardware or software schemes that make use of cryptography [ 15 , 16 , 17 ].…”
Section: Preliminariesmentioning
confidence: 99%
“…However, although it is not considered very secure [ 8 ], RC4 continues to motivate research nowadays [ 8 , 9 , 10 ]. Furthermore, this cipher is a good option to measure the effectiveness of methods that analyze weaknesses in stream ciphers related to those already known in RC4 [ 11 , 12 , 13 , 14 ], or to check the performance of hardware or software schemes that make use of cryptography [ 15 , 16 , 17 ].…”
Section: Preliminariesmentioning
confidence: 99%
“…However, although it is not considered very secure [36], RC4 is still one of the most widely used stream ciphers [37], and continues to motivate research nowadays [36][37][38]. Furthermore, this cipher is a good option to measure the effectiveness of methods that analyze weaknesses in stream ciphers related to those already known in RC4 [22,[24][25][26], or to check the performance of hardware or software schemes that make use of cryptography [39][40][41].…”
Section: Stream Ciphers and Rc4mentioning
confidence: 99%
“…The word cryptography means cipher writing. Cryptography is a way of protecting information at rest state and communication state through the uses of encryption, and only decryption key holder can access the information [7]. It has three process; key generation, encryption, and decryption process.…”
Section: Cryptographymentioning
confidence: 99%