A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Symmetric Cryptography
[chapter]
2006
Security in Fixed and Wireless Networks
Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet. ...
Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms. ...
Grants from Industry • ARA CrySCoE (Cryptographie pour la Sécurité des Codes Embarqués) Cryptography for the security of embedded systems. From January 2006 to June 2009. Partners: UVSQ/Prism, Univ. ...
doi:10.1002/0470863722.ch3
fatcat:kye7h3pmnbhkjksvyr4tj4nj7e
symmetric cryptography
[chapter]
2000
Computer Science and Communications Dictionary
Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet. ...
Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms. ...
Grants from Industry • ARA CrySCoE (Cryptographie pour la Sécurité des Codes Embarqués) Cryptography for the security of embedded systems. From January 2006 to June 2009. Partners: UVSQ/Prism, Univ. ...
doi:10.1007/1-4020-0613-6_18768
fatcat:24uzmmq3pbekxhlquwjzglnsve
Router and Link Admittance Control in the Optimized Link State Routing Protocol Version 2 (OLSRv2)
2010
2010 Fourth International Conference on Network and System Security
cryptographic algorithms, such as RSA and Elliptic Curve Cryptography for very short signatures. ...
By additionally embedding signatures for each advertised link, recipient routers can also control admittance of each advertised link in the message, rendering an OLSRv2 network resilient to both identity-spoofing ...
The router and link admittance control protocol extension is generic, in that it is not tied to any specific cryptographic system. ...
doi:10.1109/nss.2010.20
dblp:conf/nss/ClausenH10
fatcat:fyvton57kjd7rarzhsqc3lcg5y
Présentée et soutenue par : Directeur(s) de Thèse : Rapporteurs : Membre(s) du jury
2017
unpublished
It allows an authentication with the NFC reader through symmetric encryption algorithms such as AES, DES or 3DES. These cards are more robust that the previous ones. ...
Over the years, the Near Field Communication technology has emerged in our daily lives through a variety of services. ...
The cryptographical operations of the au-thentication protocol are the most consuming operations in term of performance. ...
fatcat:h2bcbj2h4vb5xmmolgetnkcqam
Contribution à la conception de systèmes numériques adaptatifs
unpublished
However, in many low-cost applications where security is not critical, cryptographic algorithms are typically implemented in software. ...
L'objectif de nos travaux est d'étudier les vulnérabilités des implantations logicielles/matérielles des algorithmes cryptographiques face à ces attaques afin de concevoir des systèmes sécurisés de bout ...
In case of the DES algorithm, the attack divides the problem into 8 subkeys of 6 bits each. ...
fatcat:mqymictyzzadvj5g42xo7kbbda
Security and Privacy in RFID Systems
2011
Contrarily to most RFID privacy models that limit privacy protection to the inability of linking the identity of two participants in two different protocol instances, we introduce a privacy model for RFID ...
portable lightweight devices such as RFID tags. ese devices have lately gained a signi cant attention for the diversity of the applications that could bene t form their features, ranging from inventory systems ...
We also argued that protocols proven private in the UC-based model of Le, Burmester and de Meideros, are still vulnerable to privacy attacks that have a practical sense. ...
doi:10.5075/epfl-thesis-5283
fatcat:sieghhxnfzd2vmpsamhzpz57da