• No results found

public-key cryptographic algorithms

Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications

Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications

... In this paper, we propose a novel programming model for tiled architectures, suitable for computationally inten- sive public key cryptographic algorithms. Our proposal is supported by a case ...

10

Analyzing the speed of combined cryptographic algorithms with secret and public key

Analyzing the speed of combined cryptographic algorithms with secret and public key

... the key is present in the encrypt data which solves the problem of secure transport of keys from the transmitter to receiver ...many algorithms available in the market for encrypting the ...

7

Cryptographic Algorithms analyzing of Different Combination with Secret and Public Key using Text and Audio Files using LabView

Cryptographic Algorithms analyzing of Different Combination with Secret and Public Key using Text and Audio Files using LabView

... Therefore, it seems necessary to develop a complete library of functions, programs and tools tailored to specific programming environments, which would give the application or system developer the opportunity to design ...

7

Cryptographic Algorithms Analyzing of Different Combination with Secret and Public Key using Text and Audio Files: A Review

Cryptographic Algorithms Analyzing of Different Combination with Secret and Public Key using Text and Audio Files: A Review

... In cryptographic systems, the key term refers to a numerical value used by an algorithm to change the information, making that information secure and visible only to individuals who possess the appropriate ...

5

Cryptographic  Schemes  Based  on  the  ASASA  Structure:  Black-box,  White-box,   and  Public-key

Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key

... designing public-key schemes based on the hardness of random instances of the MQ problem [47, 75], though no drop-in replacement for conventional public-key encryption schemes has been ...

21

Comparison of Time Complexity of Symmetric and Asymmetric Key Cryptographic Algorithms

Comparison of Time Complexity of Symmetric and Asymmetric Key Cryptographic Algorithms

... size key and a variable size encryption block. Sender uses public key which is known to all to encrypt the ...private key is used to decrypt the encrypted text. This private key is ...

5

COMAPARISON OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD COMPUTING

COMAPARISON OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD COMPUTING

... latest cryptographic algorithm that can be used to defend electronic ...Unlike public- key ciphers, which use a pair of keys, symmetric-key ciphers use the same key to encrypt and ...

7

A Review on Public Key Cryptography: Algorithms

A Review on Public Key Cryptography: Algorithms

... During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. ...

7

Volume 2, Issue 3, March 2013 Page 72

Volume 2, Issue 3, March 2013 Page 72

... environments. Cryptographic algorithms provide the underlining tools to most security protocols used in today’s ...The algorithms work off of different mathematical functions and provide different ...

9

IMPLEMENTATION AND PERFORMANCE EVALUATION OF MODULO AND MONTGOMERY MULTIPLIERS IN REAL TIME APPLICATION

IMPLEMENTATION AND PERFORMANCE EVALUATION OF MODULO AND MONTGOMERY MULTIPLIERS IN REAL TIME APPLICATION

... of cryptographic algorithms which are being used in secure communication systems, networks and security ...for cryptographic applications that bridges the gap of traditional computing techniques and ...

11

Network Security Issues and Cryptography

Network Security Issues and Cryptography

... of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is ...The public key is used to encrypt plaintext or to verify a digital ...

6

Key Management Schemes in MANET: A Review

Key Management Schemes in MANET: A Review

... Cryptographic algorithms are security primitives that are widely used for the purposes of authentication, confidentiality, integrity, and ...Most cryptographic systems require an underlying secure, ...

10

Review of Image Splicing Forgeries

Review of Image Splicing Forgeries

... encryption algorithms provide the necessary protection against the data intruders’ attacks by converting information from its normal form into an unreadable ...different cryptographic algorithms ...

11

Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction

Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction

... of Public key cryptography with simplicity of Private Key environment is presented, where public key cryptographic approach is used to simply initiate the communication and once ...

5

Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm

Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm

... symmetric key algorithms, asymmetric key algorithms and message digest ...asymmetric key and symmetric key differs from each other by number of ...Single key is used in ...

5

Encrypt-FS: A Versatile Cryptographic File System for Linux

Encrypt-FS: A Versatile Cryptographic File System for Linux

... integrating cryptographic services in file system ...a cryptographic engine for dynamic encryption and decryption to upper ...two cryptographic algorithms to encrypt a file: a symmetric ...

12

AN APPROACH FOR IoT SECURITY USING QUANTUM KEY DISTRIBUTION

AN APPROACH FOR IoT SECURITY USING QUANTUM KEY DISTRIBUTION

... security, key distribution is the major ...generally key distribution is done using public and symmetric key ...quantum key distribution protocols broken those algorithms ...

6

Certificateless  Public  Key  Signature  Schemes  from  Standard  Algorithms

Certificateless Public Key Signature Schemes from Standard Algorithms

... nature scheme. In 2001, Brown, Gallant and Vanston [15] described a modification of the OMC algorithm, which is essentially same as the Arazi’s key generation algo- rithm. This scheme later becomes known as the ...

36

Secure Search Scheme over Encrypted Cloud Data Using Greedy Depth First Search Algorithm

Secure Search Scheme over Encrypted Cloud Data Using Greedy Depth First Search Algorithm

... Practical techniques for searches on encrypted data by D. X. Song, D. Wagner. It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy ...

6

Study on Computer Generated Electromagnetic Effects on Computer Users

Study on Computer Generated Electromagnetic Effects on Computer Users

... with key 128 ...But key values are random packet data access key dynamics checking further ...process. Key random packets choose matching and merging key information secret value B node ...

5

Show all 10000 documents...

Related subjects