Foiling an exhaustive key-search attack
Cryptologia
MH & xmh: E-mail for users and programmers
MH & xmh: E-mail for users and programmers
Piloting authentication and security services within OSI applications for RTD information (PASSWORD)
JENC Conference procedings on 3rd joint European networking conference
Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
On the security of multiple encryption
Communications of the ACM
Hi-index | 0.00 |
The introduction of public key crypto-systems has opened the way to using security in distributed applications without imposing huge management overhead. Electronic mail is one area where security is important. Privacy Enhanced Mail is emerging as a de-facto international standard for the interchange of secure e-mail.This paper discusses some of the current problematic issues of PEM and introduces a PEM User Agent developed to test some of its concepts. A number of PEM design and implementation issues are explained and a conclusion on the future directions of PEM and other related work is given.