Article Fingerprint
ReserarchID
CSTGVFCA95
Now a day’s Cryptography is one of the broad areas for researchers; because of the conventional block cipher has lost its potency due to the sophistication of modern systems that can break it by brute force. Due to its importance, several cryptography techniques and algorithms are adopted by many authors to secure the data, but still there is a scope to improve the previous approaches. For this necessity, we provide the comprehensive survey which will help the researchers to provide better techniques.
Sangapu Venkata Appaji. 2014. \u201cRecent Advancements on Symmetric Cryptography Techniques -A Comprehensive Case Study\u201d. Global Journal of Computer Science and Technology - F: Graphics & Vision GJCST-F Volume 14 (GJCST Volume 14 Issue F2): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 107
Country: India
Subject: Global Journal of Computer Science and Technology - F: Graphics & Vision
Authors: Sangapu Venkata Appaji, Dr. Gomatam V S Acharyulu (PhD/Dr. count: 1)
View Count (all-time): 262
Total Views (Real + Logic): 8913
Total Downloads (simulated): 2455
Publish Date: 2014 06, Tue
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
Now a day’s Cryptography is one of the broad areas for researchers; because of the conventional block cipher has lost its potency due to the sophistication of modern systems that can break it by brute force. Due to its importance, several cryptography techniques and algorithms are adopted by many authors to secure the data, but still there is a scope to improve the previous approaches. For this necessity, we provide the comprehensive survey which will help the researchers to provide better techniques.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.