Results 1 - 10
of
3,334
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms
"... Abstract –Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There ..."
Abstract
- Add to MetaCart
. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. In this study is made for the cryptography algorithms, particularly
Additional Cryptographic Algorithms for Use with
- GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R
"... This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This document describes the cryptographic algorithms and parameters supplementary to th ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This document describes the cryptographic algorithms and parameters supplementary
CRYPTOGRAPHIC ALGORITHMS FOR UMTS
, 2004
"... Abstract. The cryptographic algorithms of GSM have received a lot of interest and activity from the cryptographic research community and some potential points of failure have been identified. These include secret designs of cryptographic algorithms and weak integrity protection over the air interfac ..."
Abstract
- Add to MetaCart
Abstract. The cryptographic algorithms of GSM have received a lot of interest and activity from the cryptographic research community and some potential points of failure have been identified. These include secret designs of cryptographic algorithms and weak integrity protection over the air
Performance Evaluation of Cryptographic Algorithms
"... In this paper, we compare the various cryptographic algorithms. On the basis of parameter taken as time various cryptographic algorithms are evaluated on different hardware’s. Different hardware’s are having different processing speed on which various size of file are processed. Calculation of time ..."
Abstract
- Add to MetaCart
In this paper, we compare the various cryptographic algorithms. On the basis of parameter taken as time various cryptographic algorithms are evaluated on different hardware’s. Different hardware’s are having different processing speed on which various size of file are processed. Calculation of time
On Repairing Broken Cryptographic Algorithms
"... We disclose a method for delaying the implementation of an attack on a cryptographic algorithm. This method may be extended to other physical security scenarios. 1 The Re-design of Algorithms The cycle of designing, attacking and re-designing cryptographic algorithms is well known to cryptographers ..."
Abstract
- Add to MetaCart
We disclose a method for delaying the implementation of an attack on a cryptographic algorithm. This method may be extended to other physical security scenarios. 1 The Re-design of Algorithms The cycle of designing, attacking and re-designing cryptographic algorithms is well known to cryptographers
Hummingbird Cryptographic Algorithm
"... Hummingbird is the latest ultra-lightweight cryptographic algorithm targeted for low cost smart devices. In this paper, we design a low power and high speed lightweight cryptographic Hummingbird algorithm for hardware environment. The performance of the approach used is determined on XILINX platform ..."
Abstract
- Add to MetaCart
Hummingbird is the latest ultra-lightweight cryptographic algorithm targeted for low cost smart devices. In this paper, we design a low power and high speed lightweight cryptographic Hummingbird algorithm for hardware environment. The performance of the approach used is determined on XILINX
Cryptographic Algorithms and Key Sizes for Personal Identity Verification
- National Institute of Standards and Technology, NIST Special Publication
, 2007
"... Cryptographic Algorithms and Key Sizes for PIV ..."
Signaling cryptographic algorithm understanding
- in dnssec,” May 2013. [Online]. Available: http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-algo-signal-10
"... The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be generated using different algorithms. This document specifies a way for validating end-system resolvers to signal to ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be generated using different algorithms. This document specifies a way for validating end-system resolvers to signal
Results 1 - 10
of
3,334