2023
DOI: 10.5120/ijca2023922701
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Hybrid Cryptography for Secure Exchange of Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Let's go through a few of the significant studies that are connected to the hybrid cryptography (nested levels of hybrid cryptography). Kumar and Saxena [1] have also implemented key exchange in hybrid cryptography with the help of AES and Paillier cryptography. In the year 2015, Kumar and Jagan [2] have implemented two-layer security for data security.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Let's go through a few of the significant studies that are connected to the hybrid cryptography (nested levels of hybrid cryptography). Kumar and Saxena [1] have also implemented key exchange in hybrid cryptography with the help of AES and Paillier cryptography. In the year 2015, Kumar and Jagan [2] have implemented two-layer security for data security.…”
Section: Related Workmentioning
confidence: 99%
“…In the first step, Paillier cryptography is followed and in the second step, the cipher text is processed by moduli that occurred from Paillier cryptography. Kumar et al [20] have implemented hybrid cryptography with the help of AES, RSA and Elliptic Curve Integrated Scheme (ECIES) cryptography. Saxena and Kumar [21] have implemented new hybrid cryptography for currency transaction with the help of fuzzy, hash cryptography, fingerprint authentication and Elgamal cryp-P. Kumar, V. Saxena Journal of Computer and Communications tography.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation