244
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      VARIOUS CRYPTOGRAPHY TECHNIQUES

      Preprint
      In review
      research-article
        1 , , 2 , 2 , 2
      ScienceOpen Preprints
      ScienceOpen
      algorithms, CRYPTOGRAPHY , ENCRYPTION
      Bookmark

            Abstract

            Security plays a full of danger position in keeping safe news given right not to be public and secrecy. Many process of changing knowledge into a secret form carefully worked designs are ready (to be used) to keep safe facts during sending (power and so on) or place for storing. These process of changing knowledge into a secret form methods (make, become, be) different in terms of power, speed, and useable materials using up (cpu 1 use, memory, and power). This learning process try to present the most having general approval and interesting algorithms currently in use.

            Content

            Author and article information

            Journal
            ScienceOpen Preprints
            ScienceOpen
            11 May 2022
            Affiliations
            [1 ] HMR Institute of technology and management
            [2 ] HMR Instititue of technology and management
            Author notes
            Author information
            https://orcid.org/0000-0002-7057-1576
            Article
            10.14293/S2199-1006.1.SOR-.PPA6BUS.v1
            70c1a7d0-daf5-4f44-8560-fb6cb4cf9ef5

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 11 May 2022

            Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
            Computer science,Engineering
            algorithms,CRYPTOGRAPHY ,ENCRYPTION

            Comments

            GOOOD ONE

            2022-06-07 17:26 UTC
            +1

            Comment on this article