참고문헌
- Pin, J., Laroden, M., & Saenz-Diez, I. (2001). Internet recruiting power: opportunities and effectiveness. Paper, Barcelona-Spain.
- Pritilata, Mahmood M.A. (2022) Strengthening Data Security Using Multi-level Cryptography Algorithm. In: Gandhi T.K., Konar D., Sen B., Sharma K. (eds) Advanced Computational Paradigms and Hybrid Intelligent Computing. Advances in Intelligent Systems and Computing, vol 1373. Springer, Singapore. https://doi.org/10.1007/978-981-16-4369-9_31
- Dayalan, M. (2019). Cryptography in Computer Security. Journal Of Emerging Technologies And Innovative Research, 6(5). Retrieved 11 March 2022, from http://www.jetir.org.
- Abood, O., & Guirguis, S. (2018). A Survey on Cryptography Algorithms. International Journal Of Scientific And Research Publications (IJSRP), 8(7). https://doi.org/10.29322/ijsrp.8.7.2018.p7978
- Sankaran P., S., & V B, K. (2019). Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm. International Journal Of Electrical And Computer Engineering (IJECE), 9(4), 2578. https://doi.org/10.11591/ijece.v9i4.pp2578-2584
- Maqsood, F., Ahmed, M., Mumtaz, M., & Ali, M. (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal Of Advanced Computer Science And Applications, 8(6). https://doi.org/10.14569/ijacsa.2017.080659
- Deshmukh, S., & Patil, P. (2014). Hybrid cryptography technique using modified Diffie-Hellman and RSA. (IJCSIT) International Journal Of Computer Science And Information Technologies, 5(0975-9646). Retrieved 11 March 2022, from http://www.ijcsit.com.
- Mandeep Kaur, N. (2016). Enhanced Security using Hybrid Encryption Algorithm. International Journal Of Innovative Research In Computer And Communication Engineering, 4(7), 13001-13007. https://doi.org/10.15680/ijircce.2016.0407001
- Santoso, K., Muin, M., & Mahmudi, M. (2020). Implementation of AES cryptography and twofish hybrid algorithms for cloud. Journal Of Physics: Conference Series, 1517(1), 012099. https://doi.org/10.1088/1742-6596/1517/1/012099
- Sajay, K., Babu, S., & Vijayalakshmi, Y. (2019). Enhancing the security of cloud data using hybrid encryption algorithm. Journal Of Ambient Intelligence And Humanized Computing. https://doi.org/10.1007/s12652-019-01403-1
- G. Chaloop, S., & Z. Abdullah, M. (2021). ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS. Journal Of Engineering And Sustainable Development, 25(4), 58-66. https://doi.org/10.31272/jeasd.25.4.6
- Et. al., P. (2021). Performance Analysis of Cascaded Hybrid Symmetric Encryption Models. Turkish Journal Of Computer And Mathematics Education (TURCOMAT), 12(2), 1699-1708. https://doi.org/10.17762/turcomat.v12i2.1506
- Kaur, M., & Kaur, J. (2017). Data Encryption Using Different Techniques: A Review. International Journal Of Advanced Research In Computer Science, 8(0976-5697). Retrieved 1 April 2022, from http://Available Online at http://www.ijarcs.info/
- Patila, P., Narayankarb, P., D G, N., & S M, M. (2015). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. In International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA. http://www.sciencedirect.com Retrieved 1 April 2022, from.
- Joseph, D., & Krishna, M. (2015). Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms. International Journal Of Advanced Research In Computer Science, 6(0976-5697). Retrieved 1 April 2022, from http://www.ijarcs.info
- Harahsheh, H., & Qatawneh, M. (2018). Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer. International Journal Of Computer Applications, 179(50), 1-7. https://doi.org/10.5120/ijca2018916654
- Comparative Analysis of AES, Blowfish, Twofish and Threefish Encryption Algorithms. (2017), 10. Retrieved 1 April 2022, from.
- Karuppiah, S., & Gurunathan, G. (2020). Secured storage and disease prediction of E-health data in cloud. Journal Of Ambient Intelligence And Humanized Computing, 12(6), 6295-6306. https://doi.org/10.1007/s12652-020-02205-6
- Gehlot, P., R. Biradar, S., & P. Singh, B. (2013). Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL. International Journal Of Computer Applications, 70(13), 36-42. https://doi.org/10.5120/12024-8087
- Singh, G., & Supriya, S. (2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal Of Computer Applications, 67(19), 33-38. https://doi.org/10.5120/11507-7224
- Radhika, N. (2018). The Secure Data Transmission in Cloud Computing By Using Encryption Techniques AES and RSA. International Research Journal Of Innovations In Engineering And Technology (IRJIET), 2(2581-3048). Retrieved 5 April 2022, from http://www.irjiet.com.
- R. Pancholi, V., & P. Patel, D. (2016). Enhancement of Cloud Computing Security with Secure Data Storage using AES. IJIRST -International Journal For Innovative Research In Science & Technology, 2(09). Retrieved 8 April 2022, from http://www.ijirst.org.
- Agrawal, A., & Patankar, G. (2016). Design of Hybrid Cryptography Algorithm for Secure Communication. International Research Journal Of Engineering And Technology (IRJET), 03(01). Retrieved 2 April 2022, from http://www.irjet.net.
- Harba, E. (2017). Secure Data Encryption Through a Combination of AES, RSA and HMAC. Engineering, Technology &Amp; Applied Science Research, 7(4), 1781-1785. https://doi.org/10.48084/etasr.1272
- Arora, H., & Jain, J. (2019). Comparison among RSA, AES and DES. International Research Journal Of Engineering And Technology (IRJET), 06(4). Retrieved 25 April 2022, from http://www.irjet.net.
- Verma, R., & Sharma, A. (2020). Cryptography: Avalanche effect of AES and RSA. International Journal Of Scientific And Research Publications (IJSRP), 10(4), p10013. https://doi.org/10.29322/ijsrp.10.04.2020.p10013
- Ghosh, A. (2020). Comparison of Encryption Algorithms: AES, Blowfish and Twofish for Security of Wireless Networks, 07(06). Retrieved 25 April 2022, from http://www.irjet.net.
- Ristiana, M. G. (2018). Hybrid algorithm of RSA and one time pad cryptography. ICCGANT.
- Jain, M., & Agrawa, A. (2014). Implementation-Of-Hybrid-Cryptography-Algorithm. International Journal Of Core Engineering & Management(IJCEM), 01(3). Retrieved 25 April 2022, from.
- Verma, R., & Sharma, A. (2020). Cryptography: A Comparative Analysis of AES and RSA Algorithms. Mukt Shabd Journal, IX(2347-3150). Retrieved 24 April 2022, from.