2016 Third International Conference on eDemocracy &Amp; eGovernment (ICEDEG) 2016
DOI: 10.1109/icedeg.2016.7461697
|View full text |Cite
|
Sign up to set email alerts
|

Encryption techniques: A theoretical overview and future proposals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Recently, more complex encryption schemes have been developed by Caesar cipher, such as Vigenè re cipher [10] , which uses Caesar cipher as a part of the whole encryption process. As we all know, ROT13 [11] is just a Caesar cipher with an offset of 13. This encryption scheme is easy to be deciphered because of the repetition of characters or strings.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, more complex encryption schemes have been developed by Caesar cipher, such as Vigenè re cipher [10] , which uses Caesar cipher as a part of the whole encryption process. As we all know, ROT13 [11] is just a Caesar cipher with an offset of 13. This encryption scheme is easy to be deciphered because of the repetition of characters or strings.…”
Section: Related Workmentioning
confidence: 99%
“…Encryption is considered best practice when storing and transferring sensitive data, and refers to various techniques, such as cryptography and random-number generation, that effectively minimize risks to privacy by securing data (Brill and Lee, 2020;Kolata, 2019;NSCAI, 2020;Sanchez et al, 2016;Simpson and Conner, 2020). However, encryption alone is not sufficient, and there have been long-standing debates regarding law enforcement access to encrypted mobile phone data (Encryption Working Group, 2019).…”
Section: Data Managementmentioning
confidence: 99%