Results 41 to 50 of about 311,948 (105)
Стойкий к коллизиям алгоритм Whirlpool [PDF]
Requirements for collision-resistant hash functions, Whirlpool algorithm and aspects of crypto primitive security are considered.Рассмотрены требования к хеш функциям устойчивым к коллизиям, алгоритм Whirlpool и аспекты безопасности ...
Котух, Евгений +1 more
core +1 more source
A Comparison of the Standardized Versions of ECIES [PDF]
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor +3 more
core
On hash functions using checksums [PDF]
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum ...
J. Hoch +7 more
core +3 more sources
Криптографические основания разработки стандарта СТ РК 1073-2002 [PDF]
Constructing conception of the standard ST RK 1073-2002 "Means of cryptographic information protection. General technical requirements", general requirements for MCIP, reasons of the selection of allowable ranges of basic parameter values of ...
Абдрахманов, Альжан +1 more
core
On the Exploitation of a High-throughput SHA-256 FPGA Design for HMAC [PDF]
High-throughput and area-efficient designs of hash functions and corresponding mechanisms for Message Authentication Codes (MACs) are in high demand due to new security protocols that have arisen and call for security services in every transmitted data ...
Costas E. Goutis +12 more
core +1 more source
An entity access control model for network services management [PDF]
The Network Services Management Framework tries to overcome the most important limitations of present network management frameworks, namely the most widely supported framework – the Internet Network Management Framework – by defining a management ...
Dias, Bruno
core
Improving the SLA-based management of QoS for secure multimedia services [PDF]
This paper proposes to integrate security parameters into the Service Level Specification (SLS) template proposed in the Tequila project to improve SLA-based management of QoS [8], [21].
Duflos, S +3 more
core +3 more sources
Криптографические основания разработки стандарта СТ РК 1073-2007 [PDF]
Constructing conception of the standard ST RK 1073-2007 "Means of cryptographic information protection. General technical requirements", general requirements for MCIP, reasons of the selection of allowable ranges of basic parameter values of ...
Абдрахманов, Альжан +1 more
core
The implementation of Logiweb [PDF]
This paper describes the implementation of the ‘Logiweb ’ system with emphasis on measures taken to support classical reasoning about programs. Logiweb is a system for authoring, storing, distributing, indexing, checking, and rendering of ‘Logiweb pages’.
Klaus Grue
core
Проблеми і тенденції розвитку апаратних засобів захисту інформації [PDF]
Розглядаються сучасні апаратні засоби реалізації криптографічних алгоритмів, криптографічних функцій та криптографічних протоколів, їх параметри та напрямки розвитку.Нardware for realization of modern cryptographic algorithms, functions and protocols ...
Коркішко, Тимур +3 more
core

