Research on various cryptography techniques

19Citations
Citations of this article
57Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security plays a critical position in preserving information privacy and secrecy. Many encryption strategies are available to protect data during transmission or storage. These encryption methods vary in terms of strength, speed, and resource consumption (CPU usage, memory, and power). This study aims to present the most popular and interesting algorithms currently in use.

Cite

CITATION STYLE

APA

Alemami, Y., Mohamed, M. A., & Atiewi, S. (2019). Research on various cryptography techniques. International Journal of Recent Technology and Engineering, 8(2 Special Issue 3), 395–405. https://doi.org/10.35940/ijrte.B1069.0782S319

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free