Prime Numbers and Modular Exponentiation in Encryption and Decryption Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Babita Bist Ramola Subject(s): Engineering, Applied Linguistics
Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures Journal title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com Authors: Yogesh Kumar , Rajiv Munjal , Harsh Sharma Subject(s):