Results 31 to 40 of about 21,677 (136)

Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]

open access: yes, 2015
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core  

Encryption using the Edwards elliptic curve [PDF]

open access: yes, 2012
Розглянуто криптографічну схему, що використовує протокол Діффі-Геллмана, застосований до кільця Zp та групи точок еліптичної кривої Едвардса. Ця схема описує алгоритм, який можна використовувати для закритого зв’язку при обміні даними по мережі ...
Коссак, О.   +3 more
core  

Implementing Elliptic Curve Cryptography [PDF]

open access: yes, 2002
Properties like short keys and efficient algorithms make elliptic curve cryptography (ECC) more and more interesting for future oriented applications. In this paper we give a short overview of the basics of ECC. Thereby we show where programmers can gain possible speed-ups and what parts are crucial.
openaire   +1 more source

Session Initiation Protocol Attacks and Challenges

open access: yes, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan   +2 more
core  

Home - About - Disclaimer - Privacy