Buscar
Mostrando ítems 1-10 de 159
Case Studies Of Performance Evaluation Of Cryptographic Algorithms For An Embedded System And A General Purpose Computer
(ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTDLONDON, 2016)
Case Studies Of Performance Evaluation Of Cryptographic Algorithms For An Embedded System And A General Purpose Computer
(Academic Press Ltd- Elsevier Science LtdLondon, 2016)
Mining Cryptography Misuse In Online Forums
(IEEE Computer SocLos Alamitos, 2016)
Uma proposta de aplicação de algoritmos criptográficos na comunicação via OPC em sistemas de automação industrialA proposal for the application of cryptographic algorithms in communication via OPC in industrial automation systems
(Universidade Federal de UberlândiaBrasilPrograma de Pós-graduação em Engenharia Elétrica, 2020)
Elliptic curve algorithms for a new PKI Hierarchy in the Peruvian State
(Institute of Electrical and Electronics Engineers Inc.PE, 2021-09-21)
In this paper we determine the elliptic curve algorithms with its respective parameters and technical specifications for a new PKI (Public Key Infrastructure) hierarchy in the Peruvian state considering the following ...
Whirlwind: a new cryptographic hash function
(SPRINGER, 2010)
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance ...
Nuevo Algoritmo Criptográfico con la incorporación de la esteganografía en imágenes.
(Escuela Superior Politécnica de Chimborazo, 2015-10)
The research paper "New cryptographic algorithm with the addition of steganography in images",
integrates two security-related fields: cryptography and steganography in order to increase the
information security, the ...