A Comparison of the Standardized Versions of ECIES [PDF]
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor +3 more
core
An entity access control model for network services management [PDF]
The Network Services Management Framework tries to overcome the most important limitations of present network management frameworks, namely the most widely supported framework – the Internet Network Management Framework – by defining a management ...
Dias, Bruno
core
High Throughput Implementation of RIPEMD-160 using Unfolding Transformation [PDF]
Cryptographic hash function is important for digital signature, Hash Message Authentication Code (HMAC) and other data security application. There are different types of hash function such as MD5, SHA-1, RIPEMD-160, SHA-2 and others.
Kuryati, Binti Kipli +5 more
core
Проблеми і тенденції розвитку апаратних засобів захисту інформації [PDF]
Розглядаються сучасні апаратні засоби реалізації криптографічних алгоритмів, криптографічних функцій та криптографічних протоколів, їх параметри та напрямки розвитку.Нardware for realization of modern cryptographic algorithms, functions and protocols ...
Коркішко, Тимур +3 more
core
Сравнительный анализ характеристик и принципов построения стандартов ЭЦП на свойствах эллиптических кривых [PDF]
Розглядаються державні та галузеві стандарти цифрового підпису, які використовують особливості еліптичних кривих. Обґрунтовуються умови необхідності введення більш криптографічно стійких алгоритмів. Робиться порівняльний аналіз прийнятих стандартів ЕЦП з
Кочубинский, Анатолий +1 more
core
The implementation of Logiweb [PDF]
This paper describes the implementation of the ‘Logiweb ’ system with emphasis on measures taken to support classical reasoning about programs. Logiweb is a system for authoring, storing, distributing, indexing, checking, and rendering of ‘Logiweb pages’.
Klaus Grue
core
Получение булевых преобразований специальных классов для построения эффективных алгоритмов защиты информации [PDF]
This paper presents investigation of nonlinear Boolean transformations inverse for which are ambiguous and its application in cryptographical algorithms. A new method for designing such class of Boolean trans-formations is suggested.
Зюзя, А. А. +2 more
core
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor [PDF]
Authentication is the process of confirming an identity. In the context of network interactions, authentication involves the confident identification of one party by another party.
Ayad, Mustafa Abdsalam
core
ELECTRONIC COMMERCE SECURITY IN THE CONTEXT OF THE MEANS OF PAYMENT DEMATERIALIZATION [PDF]
Some items regarding electronic commerce, electronic vulnerabilities, electronic means of payment, digital money and electronic micropayments are presented below.
Alexandru Pîrjan
core

