DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Security level

Security level

  • Cryptography in Modern World

    Cryptography in Modern World

  • A Review on Elliptic Curve Cryptography for Embedded Systems

    A Review on Elliptic Curve Cryptography for Embedded Systems

  • Choosing Key Sizes for Cryptography

    Choosing Key Sizes for Cryptography

  • Cryptographic Control Standard, Version

    Cryptographic Control Standard, Version

  • SHA-3 and the Hash Function Keccak

    SHA-3 and the Hash Function Keccak

  • Eurocrypt 2013 Athens, Greece, May 28Th, 2013

    Eurocrypt 2013 Athens, Greece, May 28Th, 2013

  • Broad View of Cryptographic Hash Functions

    Broad View of Cryptographic Hash Functions

  • Security Analysis of SHA-256 and Sisters

    Security Analysis of SHA-256 and Sisters

  • Modified SHA1: a Hashing Solution to Secure Web Applications Through Login Authentication

    Modified SHA1: a Hashing Solution to Secure Web Applications Through Login Authentication

  • An Introduction to Cryptographic Security Methods and Their Role in Securing Low Resource Computing Devices

    An Introduction to Cryptographic Security Methods and Their Role in Securing Low Resource Computing Devices

  • Physical Security of Elliptic Curve Cryptography Cédric Murdica

    Physical Security of Elliptic Curve Cryptography Cédric Murdica

  • Secure Hash Algorithm-3 Cryptographic Hash Functions

    Secure Hash Algorithm-3 Cryptographic Hash Functions

  • Selecting Elliptic Curves for Cryptography: an Efficiency And

    Selecting Elliptic Curves for Cryptography: an Efficiency And

  • A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

    A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

  • Cryptanalysis of Symmetric Encryption Algorithms Colin Chaigneau

    Cryptanalysis of Symmetric Encryption Algorithms Colin Chaigneau

  • Key Lengths Contribution to the Handbook of Information Security

    Key Lengths Contribution to the Handbook of Information Security

  • SHA-3 and Permutation-Based Cryptography

    SHA-3 and Permutation-Based Cryptography

  • Hardware Evaluation of the Stream Cipher-Based Hash Functions Radiogatun´ and Irrupt

    Hardware Evaluation of the Stream Cipher-Based Hash Functions Radiogatun´ and Irrupt

Top View
  • Building Hash Functions from Block Ciphers, Their Security and Implementation Properties
  • Keccak and the SHA-3 Standardization
  • SHA-1 Is a Shambles∗ First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
  • SHA-3: Where We've Been, Where We're Going
  • Security Analysis of Various Public Key Cryptosystems for Authentication and Key Agreement in Wireless Communication Network
  • Ts 119 312 V1.2.2 (2018-09)
  • CRYPTOGRAPHY and NETWORK SECURITY LECTURE NOTES for Bachelor of Technology in Computer Science and Engineering & Information Technology
  • Guidelines on Cryptographic Algorithms Usage and Key Management
  • Towards Designing Energy-Efficient Secure Hashes Priyanka Dhoopa Harish University of North Florida
  • Battery Authentication and Security Schemes (Rev. A)
  • Evaluation Report Security Level of Cryptography – SHA-256
  • Comparison of Public Key Cryptography in Different Security
  • RSA Vs. ECC Comparison for Embedded Systems
  • Security Levels in Cryptography
  • New Modified 256-Bit MD5 Algorithm with SHA Compression Function
  • On the Bit Security of Cryptographic Primitives∗†
  • The SHA-3 FIPS
  • On the Hardware Implementations of the SHA-2 (256, 384, 512) Hash


© 2024 Docslib.org    Feedback