
Encryption methods
-
Lecture Cryptography: Modern Symmetric Ciphers (Part 2) delves into the Advanced Encryption Standard (AES) and modes of operation. The lecture explains how AES improves upon previous methods and introduces multiple techniques for secure encryption processing. It also examines how data can be handled in different cipher modes. Please refer to the lecture for more details!
74p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Modern Asymmetric Ciphers (Part 2) introduces core public-key algorithms such as the ElGamal cipher and Diffie-Hellman key exchange. These methods are critical for secure communication in decentralized environments. The lecture emphasizes their mathematical foundations and security properties. Please refer to the lecture for more details!
22p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Asymmetric Ciphers (Part 3) extends into advanced asymmetric systems, including logarithm-based encryption and elliptic curve cryptography. It also introduces quantum-resistant algorithms, emphasizing future-oriented cryptographic security. This lecture highlights ongoing innovations in public-key systems. Please refer to the lecture for more details!
42p
hoatrongguong03
15-05-2025
1
1
Download
-
This paper presents a flexible, highperformance implementation of the AES algorithm on a coarse-grained reconfigurable architecture, called MUSRA (Multimedia Specific Reconfigurable Architecture). First, we propose a hardware-software partitioning method for mapping the AES algorithm onto the MUSRA. Second, the parallel and pipelining techniques are considered thoughtfully to increase total computing throughput by efficiently utilizing the computing resources of the MUSRA.
15p
tuongtieume
03-04-2025
5
1
Download
-
This paper systematically presents a specific application of linear algebra in information security and cryptography, highlighting the crucial role of matrix operations and linear techniques in the design and analysis of encryption algorithms.
8p
viaburame
14-03-2025
3
1
Download
-
Securing digital data in the process of retrieving financial information can be seen as important requirement today. This paper focuses on developing a secure encryption (SE) scheme that supports efficient querying on encrypted data in financial databases.
8p
tuetuebinhan000
23-01-2025
2
2
Download
-
The purpose of the dissertation is to research on the development of new and quality solutions using graph theory and automata, suggesting their applications in, and applying them to steganography and searchable encryption.
98p
capheviahe26
02-02-2021
21
3
Download
-
This how-to will show you a method for building a USB thumb drive with the following features: Persistent Changes – Files saved and changes made will be kept across reboots. Nessus and NessusClient installed – Everybody needs Nessus Encryption configured (Note: This is not whole drive encryption) We will also tweak a few things and make some interesting changes.
14p
itphongphu
24-11-2010
176
56
Download
-
[ Team LiB ] Understanding Information Rights Management New to Outlook 2003, Information Rights Management (IRM) enables you to secure a message, including any attachments, to prevent the recipient from printing, forwarding, or copying the message or attachment. The recipient can open the message only after she confirms her identity by logging on to her Passport account. Although there are similarities between digital signatures and IRM, they're two distinct methods you can use to secure your messages. You can digitally sign and encrypt IRM-protected messages.
2p
chutieuchuathieulam
23-07-2010
88
7
Download
CHỦ ĐỀ BẠN MUỐN TÌM
