ARCHIVES
Research Article
Parallel Processing in Hybrid Encryption Using AES and RSA
Denny Santhosh1
Kripa Shibu2
Mirin Mathew3
R Gayathry Krishna4
Jinu Mathai5
1234 B. Tech, Department of Computer Science, St. Thomas College of Engineering and Technology (STCET), Chengannur, Kerala, India. 5Assistant Professor, Department of Computer Science(AI&ML), St. Thomas College of Engineering and Technology(STCET), Chengannur, Kerala, India.
Published Online: May-August 2024
Pages: 01-04
Cite this article
No DOIReferences
1. Satish B Basapur, B.S. Shylaja, Venkatesh. (2021). “A Hybrid Cryptographic Model Using AES and RSA for Sensitive Data Privacy
Preserving”. Webology, Vol 18, Special Issue On Current Trends in Management and Information Technology.
2. Divya , D., & Santhi , G. (2021). “Secured Multi-Party Data Release on Cloud for Big Data Privacy-Preserving Using Fusion Learning”.
Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(3), 4716-472.
3. Y. Hui and L. Zesong, "Research on Real-time Analysis and Hybrid Encryption of Big Data," 2019 2nd International Conference on Artificial
Intelligence and Big Data (ICAIBD), Chengdu, China, 2019, pp. 52-55, doi: 10.1109/ICAIBD.2019.8836992.
4. L. Zhang, B. Li and X. Zhao, "Reconfigurable Hardware Implementation of AES-RSA Hybrid Encryption and Decryption," 2020 IEEE 5th
International Conference on Signal and Image Processing (ICSIP), Nanjing, China, 2020, pp. 970-974, doi:
10.1109/ICSIP49896.2020.9339251.
5. W. hong, W. sheng, Z. qing and Z. jian, "Research on Data Encryption of Network Communication Based on Big Data," 2020 International
Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), Fuzhou, China, 2020, pp. 129-131, doi:
10.1109/ICBAIE49996.2020.00033
Preserving”. Webology, Vol 18, Special Issue On Current Trends in Management and Information Technology.
2. Divya , D., & Santhi , G. (2021). “Secured Multi-Party Data Release on Cloud for Big Data Privacy-Preserving Using Fusion Learning”.
Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(3), 4716-472.
3. Y. Hui and L. Zesong, "Research on Real-time Analysis and Hybrid Encryption of Big Data," 2019 2nd International Conference on Artificial
Intelligence and Big Data (ICAIBD), Chengdu, China, 2019, pp. 52-55, doi: 10.1109/ICAIBD.2019.8836992.
4. L. Zhang, B. Li and X. Zhao, "Reconfigurable Hardware Implementation of AES-RSA Hybrid Encryption and Decryption," 2020 IEEE 5th
International Conference on Signal and Image Processing (ICSIP), Nanjing, China, 2020, pp. 970-974, doi:
10.1109/ICSIP49896.2020.9339251.
5. W. hong, W. sheng, Z. qing and Z. jian, "Research on Data Encryption of Network Communication Based on Big Data," 2020 International
Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), Fuzhou, China, 2020, pp. 129-131, doi:
10.1109/ICBAIE49996.2020.00033
Related Articles
2024
Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development
2024
Website Development in Computer Science: Unveiling the Digital World
2024
Review on RSA Cryptography, Steganography and Compression Techniques for Data Security
2024
Stock Price Prediction Using LSTM
2024
Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler
2024