- Home
- » Tags
- » Security level
Top View
- Building Hash Functions from Block Ciphers, Their Security and Implementation Properties
- Keccak and the SHA-3 Standardization
- SHA-1 Is a Shambles∗ First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
- SHA-3: Where We've Been, Where We're Going
- Security Analysis of Various Public Key Cryptosystems for Authentication and Key Agreement in Wireless Communication Network
- Ts 119 312 V1.2.2 (2018-09)
- CRYPTOGRAPHY and NETWORK SECURITY LECTURE NOTES for Bachelor of Technology in Computer Science and Engineering & Information Technology
- Guidelines on Cryptographic Algorithms Usage and Key Management
- Towards Designing Energy-Efficient Secure Hashes Priyanka Dhoopa Harish University of North Florida
- Battery Authentication and Security Schemes (Rev. A)
- Evaluation Report Security Level of Cryptography – SHA-256
- Comparison of Public Key Cryptography in Different Security
- RSA Vs. ECC Comparison for Embedded Systems
- Security Levels in Cryptography
- New Modified 256-Bit MD5 Algorithm with SHA Compression Function
- On the Bit Security of Cryptographic Primitives∗†
- The SHA-3 FIPS
- On the Hardware Implementations of the SHA-2 (256, 384, 512) Hash
- Security Evaluation of SHA-3
- Elliptic Curve Cryptography in Practice
- FIPS 140-2 and Other Cryptography Based Standards
- Hash Functions: Theory, Attacks, and Applications
- Pairing-Based Cryptography at High Security Levels
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- Security Review of the SHA-1 and MD5 Cryptographic Hash Algorithms
- Developing New Multilevel Security Algorithm for Data Encryption-Decryption (MLS ED)
- Hash Algorithms Hash Algorithms Driven by the Slowness of RSA in Signing a Message
- Cryptographic Modules, Security Level “Moderate”
- FIPS 140-2 Are Accepted by the Federal Agencies of Both Countries for the Protection of Sensitive Information (United States) Or Designated Information (Canada)
- LNCS 3329, Pp
- An Overview of Punic Key Cryptography
- Data Security in Cloud Computing Using Elliptic Curve Cryptography
- Security Based Approach of SHA 384 and SHA 512 Algorithms in Cloud Environment
- SHA-3 and the Hash Function Keccak
- A New SHA-3 Implementation on Low-End Microcontrollers
- The PHOTON Family of Lightweight Hash Functions
- Implementation of Advanced Encryption Standard (AES) Algorithm on FPGA
- On the Security of Hash Function Combiners
- The State of Elliptic Curve Cryptography
- FIPS 140-3 Security Requirements For
- Analysis of SHA-512/224 and SHA-512/256
- Open Problems in Hash Function Security
- Quantum Safe Cryptography and Security an Introduction, Benefits, Enablers and Challenges
- Operational Best Practices for Encryption Key Management
- Explain Public Key Cryptography Principles Public Key Cryptography Unlike Symmetric Key Cryptography, We Do Not Find Historical Use of Public-Key Cryptography
- Recommendation for Key Management, Part 3: Application
- SHA-1 Is a Shambles First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
- (HLES) As an Improvement of 512-Bit AES for Secure Multimedia
- RSA and ECC: a Comparative Analysis
- Sponge Functions
- Cryptographic Mechanisms: Recommendations and Key Lengths
- Data Encryption and Authetication Using Public Key Approach
- A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization
- A Brief Discussion on Selecting New Elliptic Curves
- An Overview of Public Key Cryptography
- Evaluation Report Security Level of Cryptography – SHA-384 and SHA
- Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
- Mode-Level Vs. Implementation-Level Physical Security in Symmetric Cryptography a Practical Guide Through the Leakage-Resistance Jungle
- Denning-Cryptographydatasecurity