Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{145039,
author = {Monika Mishra and Shashi Sharma and Dr. Varun P saxena},
title = {Cryptography: A Complete Review Monika Mishra},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {4},
number = {7},
pages = {198-202},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=145039},
abstract = {Security is also desired to be proper in order to data to be shared securely so we have reviewed some cryptographic concept which will be used in our paper to implement the proposed work. Here we have explored the concept of cryptography, Diffie-Hellman , Hash Functions.},
keywords = {Diffie-Hellman, Cryptography, Hash Functions},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry