![](images/graphics/blank.gif)
Encryption algorithms
-
The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.
11p
visergeyne
18-06-2024
3
0
Download
-
The information age has seen the development of electronic pathways that carry vast amounts of valuable commercial, scientific, and educational information between financial institutions, companies, individuals, and government organisations. Unfortunately the unprecedented levels of access provided by systems like the Internet also expose this data to breaches of confidentiality, disruption of service, and outright theft. The cryptlib security toolkit provides the answer to this problem. A complete description of the capabilities provided by cryptlib is given below.
342p
zizaybay1103
29-05-2024
3
2
Download
-
Ebook "Cryptography and security services: Mechanisms and applications" presents the following content: Chapter 1 introduction, chapter 2 ASN.1 encoding, chapter 3 random number generation, chapter 4 advanced encryption standard, chapter 5 hash functions, chapter 6 message - authentication code algorithms, chapter 7 encrypt and authenticate modes, chapter 8 large integer arithmetic, chapter 9 public key algorithms.
446p
zizaybay1103
29-05-2024
4
2
Download
-
The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.
372p
zizaybay1103
29-05-2024
5
2
Download
-
Ebook Bluetooth security presents the following content: Chapter 1 introduction; chapter 2 overview of the bluetooth security architecture; chapter 3 bluetooth pairing and key management; chapter 4 algorithms; chapter 5 broadcast encryption; chapter 6 security policies and access control; chapter 7 attacks, strengths, and weaknesses; chapter 8 providing anonymity; chapter 9 key management extensions; chapter 10 security for bluetooth applications.
222p
haojiubujain06
05-09-2023
4
1
Download
-
Ebook Web security: A whitehat perspective – Part 2 includes contents: Chapter 10: Access control, Chapter 11: Encryption algorithms and random numbers, Chapter 12: Web framework security, Chapter 13: Application-layer denial-of-service attacks, Chapter 14: PHP security, Chapter 15: Web server configuration security, Chapter 16: Security of internet business, Chapter 17: Security development lifecycle, Chapter 18: Security operations.
266p
haojiubujain06
06-09-2023
5
4
Download
-
Ebook Web services security and e-business: Part 2 includes contents: Chapter X Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues; Chapter XI An introductory study on business intelligence security; Chapter XII Secure trust transfer using chain signatures; Chapter XIII Distributed intrusion detection systems: An overview;…
210p
haojiubujain06
06-09-2023
10
3
Download
-
The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This scheme can perform security functions and authenticate the origin and integrity of the encrypted message simultaneously. Moreover, the proposed scheme is also used as the basis for developing an algorithm to establish a shared secret key for symmetric key cryptosystems.
10p
viengels
25-08-2023
6
4
Download
-
The resource costs of each design on the FPGA were provided after the program had run, and these data were compiled for analysis. In the context of this study, we advise system designers to incorporate the RIJNDEAL algorithm into IoT systems in order to achieve data encryption.
11p
nhanchienthien
25-07-2023
7
4
Download
-
This paper presents a protocol to enhance the secrecy of exchanging symmetric key and the flexibility of updating the partially reconfigurable embedded system over the Internet. The proposed protocol uses an asymmetric encryption algorithm to protect symmetric encryption keys from thefts and tampers over a transmission line.
6p
vilexus
30-09-2022
32
6
Download
-
An embedded device is becoming popular in daily life thanks to their low power consumption and multiprocessing capability. In particular, the security of embedded devices has been a big issue of concern to academic and industrial communities. This study aims at the Grain 128- AEAD authenticated encryption with associated data algorithm embedded on low-power and resourceconstrained devices.
12p
viaudi
29-08-2022
10
3
Download
-
In this paper, we present and discuss performance of lightweight encryption algorithms integrated on IoT devices which are limited in resources, power and processing capacity and criteria to choose appropriate algorithm for each specific IoT application.
5p
vimelindagates
18-07-2022
4
2
Download
-
With the rise of the Internet of Things (IoT), the risk of information security is increasing. There have been many proposals for IoT security, however, so far, there is not truly effective and comprehensive solution. The study aims at lightweight encryption, with the basic goal of reducing the loops of encryption algorithms, reducing the computing requirements, and energy consumption of the system while ensuring safety, and integrating into new Protocols of IoT networks and weak resource devices.
8p
vimelindagates
18-07-2022
50
5
Download
-
Advanced Computer Networks: Lecture 40. This lecture will cover the following: security; encryption algorithms; cryptography functions; taxonomy of network security; secret key encryption; public key authentication; authentication protocols; message integrity protocols; key distribution; firewalls;...
31p
haoasakura
30-05-2022
25
4
Download
-
Bài báo này trình bày một phương pháp nén tín hiệu điện tim (ECG – Electrocardiography) sử dụng thuật toán TP (Turning Point) kết hợp với kỹ thuật giấu tin để bảo mật thông tin bệnh nhân. Tín hiệu ECG ban đầu sẽ được nén với tỉ lệ 2:1 trước khi dữ liệu của bệnh nhân được nhúng vào. Thuật toán mã hóa AES (Advanced Encryption Standard) cùng hàm băm SHA3 (Secure Hash Algorithm-3) được sử dụng để tăng tính bảo mật và xác thực cho thông tin bệnh nhân trước khi nhúng.
4p
wangziyi_1307
26-04-2022
29
4
Download
-
The paper proposes encryption - authentication algorithms developed from the Elgamal cryptosystem. There are algorithms included: System parameters, keys, encryption, and authenticated decryption.
10p
vikissinger
03-03-2022
5
1
Download
-
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 1: Introduction, classical encryption techniques, block ciphers and the data encryption standard, finite fields, advanced encryption standard, more on symmetric ciphers, confidentiality using symmetric encryption, introduction to number theory, public-key cryptography and RSA, key management - other public-key cryptosystems, message authentication and hash functions, hash and MAC algorithms, digital signatures and authentication protocols,...
576p
lovebychance04
20-05-2021
35
5
Download
-
—In this paper, we present the dynamic cryptographic algorithms for long states named ACDEL-2D and ACDEL-3D. The first one was inspired by Rijndael and the second one was inspired by 3D, a three-dimensional block cipher. In both proposals, MDS matrices are used alternately on rows and columns of the state and all transformations used in the encryption process are randomly selected depending on pseudorandom sequences.
13p
chauchaungayxua12
11-05-2021
26
4
Download
-
The presented algorithm has shown the accuracy of classification of the sequences specified in the work 0.98 and can be implemented in DLP systems to prevent the transmission of information in encrypted or compressed form.
8p
chauchaungayxua12
11-05-2021
24
4
Download
-
"Lecture Public key encryption algorithm and the random oracle" present network security digital signature; digital signatures with appendix; digital signatures with message recovery; digital signatures based on RSA.
9p
lehongdang2021
10-05-2021
1426
1385
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)