• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,334
Next 10 →

cryptographic algorithms

by Burkhard Englert, Darin Goldstein, Will Murray
"... Twisting an elliptic curve to speed up ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Twisting an elliptic curve to speed up

Cryptographic Algorithms

by Y. Oiwa, H. Takagi, B. Kihara, T. Hayashi, Y. Ioku , 2011
"... ..."
Abstract - Add to MetaCart
Abstract not found

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms

by V V Nagar
"... Abstract –Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There ..."
Abstract - Add to MetaCart
. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. In this study is made for the cryptography algorithms, particularly

Additional Cryptographic Algorithms for Use with

by V. Popov, I. Kurepkin, S. Leontiev - GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R
"... This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This document describes the cryptographic algorithms and parameters supplementary to th ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This document describes the cryptographic algorithms and parameters supplementary

CRYPTOGRAPHIC ALGORITHMS FOR UMTS

by P. Neittaanmäki, T. Rossi, S. Korotov, E. Oñate, J. Périaux, D. Knörzer (eds, Kaisa Nyberg, Kaisa Nyberg , 2004
"... Abstract. The cryptographic algorithms of GSM have received a lot of interest and activity from the cryptographic research community and some potential points of failure have been identified. These include secret designs of cryptographic algorithms and weak integrity protection over the air interfac ..."
Abstract - Add to MetaCart
Abstract. The cryptographic algorithms of GSM have received a lot of interest and activity from the cryptographic research community and some potential points of failure have been identified. These include secret designs of cryptographic algorithms and weak integrity protection over the air

Performance Evaluation of Cryptographic Algorithms

by Mohit Mittal
"... In this paper, we compare the various cryptographic algorithms. On the basis of parameter taken as time various cryptographic algorithms are evaluated on different hardware’s. Different hardware’s are having different processing speed on which various size of file are processed. Calculation of time ..."
Abstract - Add to MetaCart
In this paper, we compare the various cryptographic algorithms. On the basis of parameter taken as time various cryptographic algorithms are evaluated on different hardware’s. Different hardware’s are having different processing speed on which various size of file are processed. Calculation of time

On Repairing Broken Cryptographic Algorithms

by Michael P. Abramson, William J. Layton
"... We disclose a method for delaying the implementation of an attack on a cryptographic algorithm. This method may be extended to other physical security scenarios. 1 The Re-design of Algorithms The cycle of designing, attacking and re-designing cryptographic algorithms is well known to cryptographers ..."
Abstract - Add to MetaCart
We disclose a method for delaying the implementation of an attack on a cryptographic algorithm. This method may be extended to other physical security scenarios. 1 The Re-design of Algorithms The cycle of designing, attacking and re-designing cryptographic algorithms is well known to cryptographers

Hummingbird Cryptographic Algorithm

by Nikita Arora, Yogita Gigras
"... Hummingbird is the latest ultra-lightweight cryptographic algorithm targeted for low cost smart devices. In this paper, we design a low power and high speed lightweight cryptographic Hummingbird algorithm for hardware environment. The performance of the approach used is determined on XILINX platform ..."
Abstract - Add to MetaCart
Hummingbird is the latest ultra-lightweight cryptographic algorithm targeted for low cost smart devices. In this paper, we design a low power and high speed lightweight cryptographic Hummingbird algorithm for hardware environment. The performance of the approach used is determined on XILINX

Cryptographic Algorithms and Key Sizes for Personal Identity Verification

by W. Timothy Polk, Donna F. Dodson, William E. Burr, Hildegard Ferraiolo, David Cooper, W. Timothy Polk, Donna F. Dodson, William E. Burr, Hildegard Ferraiolo, David Cooper - National Institute of Standards and Technology, NIST Special Publication , 2007
"... Cryptographic Algorithms and Key Sizes for PIV ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Cryptographic Algorithms and Key Sizes for PIV

Signaling cryptographic algorithm understanding

by S. Crocker, Shinkuro Inc, S. Rose - in dnssec,” May 2013. [Online]. Available: http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-algo-signal-10
"... The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be generated using different algorithms. This document specifies a way for validating end-system resolvers to signal to ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be generated using different algorithms. This document specifies a way for validating end-system resolvers to signal
Next 10 →
Results 1 - 10 of 3,334
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University