Application of Classical and Genomic Cryptography on Textual Dataset
Abstract
Keywords
Supporting Institution
References
- Md M.A. Aziz, Md N. Sadat, D. Alhadidi, S. Wang, X. Jiang, C.L. Brown, N. Mohammed, “Privacy-preserving techniques of genomic data—a survey”, Briefings in Bioinformatics, vol. 20, 887–895, 2019. https://doi.org/10.1093/bib/bbx139
- L. Bonomi, Y. Huang &, L. Ohno-Machado, “Privacy challenges and research opportunities for genomic data sharing”, Nat Genet 52, 646–654, 2020. https://doi.org/10.1038/s41588-020-0651-0
- Z. Wan, J.W. Hazel, E.W. Clayton, et al., “Sociotechnical safeguards for genomic data privacy”, Nat Rev Genet 23, 429–445, 2022. https://doi.org/10.1038/s41576-022-00455-y
- Y. Jiang, T. Shang, & J. Liu, “SM algorithms-based encryption scheme for large genomic data files”, Digital Communications and Networks, 7(4), 543-550, 2021. https://doi.org/10.1016/j.dcan.2020.12.004
- H. Feistel, “Cryptography and computer privacy”, Scientific american, 228(5), 15-23, 1973. https://www.jstor.org/stable/24923044
- G.J. Simmons, “Symmetric and asymmetric encryption”, ACM Computing Surveys (CSUR), 11(4), 305-330, 1979. https://doi.org/10.1145/356789.356793
- P. Mahajan & A. Sachdeva, “A study of encryption algorithms AES, DES and RSA for security”, Global journal of computer science and technology, 13(15), 15-22, 2013.
- H. Handschuh, L.R. Knudsen. M.J. Robshaw, 2001, “Analysis of SHA-1 in encryption mode”, In Cryptographers’ Track at the RSA Conference, 70-83, 2001. https://doi.org/10.1007/3-540-45353-9_7
Details
Primary Language
English
Subjects
Software Engineering (Other)
Journal Section
Research Article
Early Pub Date
December 10, 2024
Publication Date
December 31, 2024
Submission Date
May 14, 2024
Acceptance Date
July 30, 2024
Published in Issue
Year 2024 Volume: 7 Number: 3
