Java cryptography
The Twofish encryption algorithm: a 128-bit block cipher
The Twofish encryption algorithm: a 128-bit block cipher
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SSL and TLS Essentials: Securing the Web with CD-ROM
SSL and TLS Essentials: Securing the Web with CD-ROM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Hi-index | 0.00 |
The unprecedented growing demands on security and privacy protection ushered the proliferation of cryptographic tools. This article presents a study on the performance comparison of cryptographic Application Program Interfaces (APIs) that are implemented for the Java and the.Net frameworks. The results of the study clearly indicate the superiority of a set of commercial cryptographic APIs over its open-source counterpart.