Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6 Hits in 2.7 sec

Symmetric Cryptography [chapter]

2006 Security in Fixed and Wireless Networks  
Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet.  ...  Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms.  ...  Grants from Industry • ARA CrySCoE (Cryptographie pour la Sécurité des Codes Embarqués) Cryptography for the security of embedded systems. From January 2006 to June 2009. Partners: UVSQ/Prism, Univ.  ... 
doi:10.1002/0470863722.ch3 fatcat:kye7h3pmnbhkjksvyr4tj4nj7e

symmetric cryptography [chapter]

Martin H. Weik
2000 Computer Science and Communications Dictionary  
Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet.  ...  Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms.  ...  Grants from Industry • ARA CrySCoE (Cryptographie pour la Sécurité des Codes Embarqués) Cryptography for the security of embedded systems. From January 2006 to June 2009. Partners: UVSQ/Prism, Univ.  ... 
doi:10.1007/1-4020-0613-6_18768 fatcat:24uzmmq3pbekxhlquwjzglnsve

Router and Link Admittance Control in the Optimized Link State Routing Protocol Version 2 (OLSRv2)

Thomas Clausen, Ulrich Herberg
2010 2010 Fourth International Conference on Network and System Security  
cryptographic algorithms, such as RSA and Elliptic Curve Cryptography for very short signatures.  ...  By additionally embedding signatures for each advertised link, recipient routers can also control admittance of each advertised link in the message, rendering an OLSRv2 network resilient to both identity-spoofing  ...  The router and link admittance control protocol extension is generic, in that it is not tied to any specific cryptographic system.  ... 
doi:10.1109/nss.2010.20 dblp:conf/nss/ClausenH10 fatcat:fyvton57kjd7rarzhsqc3lcg5y

Présentée et soutenue par : Directeur(s) de Thèse : Rapporteurs : Membre(s) du jury

M Mohamed, Amine Bouazzouni, M Fabrice, Peyrard Conchon, M Nguyen, M Marie, Pierre Gleizes, Universite Toulouse, Président Paradinas, Cnam Paris
2017 unpublished
It allows an authentication with the NFC reader through symmetric encryption algorithms such as AES, DES or 3DES. These cards are more robust that the previous ones.  ...  Over the years, the Near Field Communication technology has emerged in our daily lives through a variety of services.  ...  The cryptographical operations of the au-thentication protocol are the most consuming operations in term of performance.  ... 
fatcat:h2bcbj2h4vb5xmmolgetnkcqam

Contribution à la conception de systèmes numériques adaptatifs

Pascal Benoit, Pascal
unpublished
However, in many low-cost applications where security is not critical, cryptographic algorithms are typically implemented in software.  ...  L'objectif de nos travaux est d'étudier les vulnérabilités des implantations logicielles/matérielles des algorithmes cryptographiques face à ces attaques afin de concevoir des systèmes sécurisés de bout  ...  In case of the DES algorithm, the attack divides the problem into 8 subkeys of 6 bits each.  ... 
fatcat:mqymictyzzadvj5g42xo7kbbda

Security and Privacy in RFID Systems

Khaled Ouafi
2011
Contrarily to most RFID privacy models that limit privacy protection to the inability of linking the identity of two participants in two different protocol instances, we introduce a privacy model for RFID  ...  portable lightweight devices such as RFID tags. ese devices have lately gained a signi cant attention for the diversity of the applications that could bene t form their features, ranging from inventory systems  ...  We also argued that protocols proven private in the UC-based model of Le, Burmester and de Meideros, are still vulnerable to privacy attacks that have a practical sense.  ... 
doi:10.5075/epfl-thesis-5283 fatcat:sieghhxnfzd2vmpsamhzpz57da