Emerging network security standards in an OSI environment
Computer Standards & Interfaces
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Efficient identification and signatures for smart cards
CRYPTO '89 Proceedings on Advances in cryptology
The digital signature standard
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
Differential Cryptanalysis of the Full 16-Round DES
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Emerging Standards for Public-Key Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Two methods of authenticated positioning
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Secure billing for ubiquitous service delivery
ICQT'06 Proceedings of the 5th international conference on Internet Charging and QoS Technologies: performability has its Price
Hi-index | 0.00 |
The author reviews encryption algorithms and standards, how they compare, how they differ, and where they are headed. Attention is given to secret-key cryptosystems, public-key cryptosystems, digital signature schemes, key-agreement algorithms, cryptographic hash functions, and authentication codes. Applications considered are secure electronic mail, secure communications, directory authentication and network management, banking, and escrowed encryption.