Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/5515
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVashi, Devendra I.-
dc.contributor.authorPatel, Kuntal-
dc.date.accessioned2015-07-10T08:56:31Z-
dc.date.available2015-07-10T08:56:31Z-
dc.date.issued2015-04-11-
dc.identifier.citationInternational Conference on Engineering: Issues, Opportunities and Challenges for Development, S. N. Patel Institute of Technology & Research Centre, Vidyabharti Campus, At & Po Umrakh, Ta: Bardoli, Dist.: Surat, Gujarat, India, Pin: 394345, April 11, 2015en_US
dc.identifier.urihttp://hdl.handle.net/123456789/5515-
dc.description.abstractin privacy preserving data mining technique cryptographic process is good to implement properly for making data private while sending data to third party. This paper is just a study of some of the encryption and decryption technique like DES, RSA and hash function which can be implemented for cryptography. This paper is also emphasized on comparative study on different encryption technique and how is useful in cryptographic technique.en_US
dc.relation.ispartofseriesITFCA008-8;-
dc.subjectCryptographyen_US
dc.subjectSymmetric Keyen_US
dc.subjectAsymmetric Keyen_US
dc.subjectEncryptionen_US
dc.subjectDecryptionen_US
dc.subjectCiphertexten_US
dc.subjectDESen_US
dc.subjectRSAen_US
dc.subjectAESen_US
dc.subjectComputer Faculty Paperen_US
dc.subjectFaculty Paperen_US
dc.subjectITFCA008en_US
dc.titleComparative Study of Some Cryptographic Algorithmsen_US
dc.typeFaculty Papersen_US
Appears in Collections:Faculty Papers, CE

Files in This Item:
File Description SizeFormat 
ITFCA008-8.pdfITFCA008-8528.06 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.