intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Encryption algorithms

Xem 1-20 trên 94 kết quả Encryption algorithms
  • The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

    pdf11p visergeyne 18-06-2024 3 0   Download

  • The information age has seen the development of electronic pathways that carry vast amounts of valuable commercial, scientific, and educational information between financial institutions, companies, individuals, and government organisations. Unfortunately the unprecedented levels of access provided by systems like the Internet also expose this data to breaches of confidentiality, disruption of service, and outright theft. The cryptlib security toolkit provides the answer to this problem. A complete description of the capabilities provided by cryptlib is given below.

    pdf342p zizaybay1103 29-05-2024 3 2   Download

  • Ebook "Cryptography and security services: Mechanisms and applications" presents the following content: Chapter 1 introduction, chapter 2 ASN.1 encoding, chapter 3 random number generation, chapter 4 advanced encryption standard, chapter 5 hash functions, chapter 6 message - authentication code algorithms, chapter 7 encrypt and authenticate modes, chapter 8 large integer arithmetic, chapter 9 public key algorithms.

    pdf446p zizaybay1103 29-05-2024 4 2   Download

  • The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.

    pdf372p zizaybay1103 29-05-2024 5 2   Download

  • Ebook Bluetooth security presents the following content: Chapter 1 introduction; chapter 2 overview of the bluetooth security architecture; chapter 3 bluetooth pairing and key management; chapter 4 algorithms; chapter 5 broadcast encryption; chapter 6 security policies and access control; chapter 7 attacks, strengths, and weaknesses; chapter 8 providing anonymity; chapter 9 key management extensions; chapter 10 security for bluetooth applications.

    pdf222p haojiubujain06 05-09-2023 4 1   Download

  • Ebook Web security: A whitehat perspective – Part 2 includes contents: Chapter 10: Access control, Chapter 11: Encryption algorithms and random numbers, Chapter 12: Web framework security, Chapter 13: Application-layer denial-of-service attacks, Chapter 14: PHP security, Chapter 15: Web server configuration security, Chapter 16: Security of internet business, Chapter 17: Security development lifecycle, Chapter 18: Security operations.

    pdf266p haojiubujain06 06-09-2023 5 4   Download

  • Ebook Web services security and e-business: Part 2 includes contents: Chapter X Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues; Chapter XI An introductory study on business intelligence security; Chapter XII Secure trust transfer using chain signatures; Chapter XIII Distributed intrusion detection systems: An overview;…

    pdf210p haojiubujain06 06-09-2023 10 3   Download

  • The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This scheme can perform security functions and authenticate the origin and integrity of the encrypted message simultaneously. Moreover, the proposed scheme is also used as the basis for developing an algorithm to establish a shared secret key for symmetric key cryptosystems.

    pdf10p viengels 25-08-2023 6 4   Download

  • The resource costs of each design on the FPGA were provided after the program had run, and these data were compiled for analysis. In the context of this study, we advise system designers to incorporate the RIJNDEAL algorithm into IoT systems in order to achieve data encryption.

    pdf11p nhanchienthien 25-07-2023 7 4   Download

  • This paper presents a protocol to enhance the secrecy of exchanging symmetric key and the flexibility of updating the partially reconfigurable embedded system over the Internet. The proposed protocol uses an asymmetric encryption algorithm to protect symmetric encryption keys from thefts and tampers over a transmission line.

    pdf6p vilexus 30-09-2022 32 6   Download

  • An embedded device is becoming popular in daily life thanks to their low power consumption and multiprocessing capability. In particular, the security of embedded devices has been a big issue of concern to academic and industrial communities. This study aims at the Grain 128- AEAD authenticated encryption with associated data algorithm embedded on low-power and resourceconstrained devices.

    pdf12p viaudi 29-08-2022 10 3   Download

  • In this paper, we present and discuss performance of lightweight encryption algorithms integrated on IoT devices which are limited in resources, power and processing capacity and criteria to choose appropriate algorithm for each specific IoT application.

    pdf5p vimelindagates 18-07-2022 4 2   Download

  • With the rise of the Internet of Things (IoT), the risk of information security is increasing. There have been many proposals for IoT security, however, so far, there is not truly effective and comprehensive solution. The study aims at lightweight encryption, with the basic goal of reducing the loops of encryption algorithms, reducing the computing requirements, and energy consumption of the system while ensuring safety, and integrating into new Protocols of IoT networks and weak resource devices.

    pdf8p vimelindagates 18-07-2022 50 5   Download

  • Advanced Computer Networks: Lecture 40. This lecture will cover the following: security; encryption algorithms; cryptography functions; taxonomy of network security; secret key encryption; public key authentication; authentication protocols; message integrity protocols; key distribution; firewalls;...

    ppt31p haoasakura 30-05-2022 25 4   Download

  • Bài báo này trình bày một phương pháp nén tín hiệu điện tim (ECG – Electrocardiography) sử dụng thuật toán TP (Turning Point) kết hợp với kỹ thuật giấu tin để bảo mật thông tin bệnh nhân. Tín hiệu ECG ban đầu sẽ được nén với tỉ lệ 2:1 trước khi dữ liệu của bệnh nhân được nhúng vào. Thuật toán mã hóa AES (Advanced Encryption Standard) cùng hàm băm SHA3 (Secure Hash Algorithm-3) được sử dụng để tăng tính bảo mật và xác thực cho thông tin bệnh nhân trước khi nhúng.

    pdf4p wangziyi_1307 26-04-2022 29 4   Download

  • The paper proposes encryption - authentication algorithms developed from the Elgamal cryptosystem. There are algorithms included: System parameters, keys, encryption, and authenticated decryption.

    pdf10p vikissinger 03-03-2022 5 1   Download

  • The following will be discussed in Cryptography and Network Security Principles and Practices - Part 1: Introduction, classical encryption techniques, block ciphers and the data encryption standard, finite fields, advanced encryption standard, more on symmetric ciphers, confidentiality using symmetric encryption, introduction to number theory, public-key cryptography and RSA, key management - other public-key cryptosystems, message authentication and hash functions, hash and MAC algorithms, digital signatures and authentication protocols,...

    pdf576p lovebychance04 20-05-2021 35 5   Download

  • —In this paper, we present the dynamic cryptographic algorithms for long states named ACDEL-2D and ACDEL-3D. The first one was inspired by Rijndael and the second one was inspired by 3D, a three-dimensional block cipher. In both proposals, MDS matrices are used alternately on rows and columns of the state and all transformations used in the encryption process are randomly selected depending on pseudorandom sequences.

    pdf13p chauchaungayxua12 11-05-2021 26 4   Download

  • The presented algorithm has shown the accuracy of classification of the sequences specified in the work 0.98 and can be implemented in DLP systems to prevent the transmission of information in encrypted or compressed form.

    pdf8p chauchaungayxua12 11-05-2021 24 4   Download

  • "Lecture Public key encryption algorithm and the random oracle" present network security digital signature; digital signatures with appendix; digital signatures with message recovery; digital signatures based on RSA.

    pdf9p lehongdang2021 10-05-2021 1426 1385   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1446 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
3=>0