Scope of the material This material is mainly intended for students following lectures on Cryptography and Systems Security at Politehnica University of Timisoara (UPT), Romania. The main intention of these notes is to show that the theoretical objects discussed during lectures, besides their practical value which reasonably follows from relevance of information security today, are also present in a large variety of programming frameworks. It was a main intention not to bind the content of the notes with a particular programming framework as cryptography is platform independent. For this reason, we make use of C programming under Linux (Section 1),.NET (Sections 2-5) and Java (Sections 6 and 7). These notes are intended for engineers and ar...
This paper describes an implementation of a Secure Coding learning package for Undergraduate student...
The purpose of the article is to describe main documents concerned with a personal data security. Th...
While cryptography is now readily available to everyone and can, provably, protect private informati...
The purpose of this book is to present some of the critical security challenges in today's computing...
Cryptography is an old idea and science, but its approach exists and plays a large role in moderniza...
This thesis is focused on encryption with Java libraries. Goal si to compare the libraries in the al...
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography ed...
This bachelor's thesis deals with description of cryptography and Public Key Infrastructure in Lotus...
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text cipher...
The aim of this bachelor thesis is to create a scripting language and a program (language interprete...
The goal of the paper is to analyse common problems of implementation of cryptographic algorithms, a...
Abstract. A new experience for teaching Cryptography to engineer-ing students is shown. The aim is t...
The point of this work is to show how to solve certain cryptographic problems in Microsoft .Net Fram...
In the present work we study applied cryptography. . . The goal of this work is not to study algorit...
This master thesis deals with a search of cryptographic primitives for embedded systems, which are t...
This paper describes an implementation of a Secure Coding learning package for Undergraduate student...
The purpose of the article is to describe main documents concerned with a personal data security. Th...
While cryptography is now readily available to everyone and can, provably, protect private informati...
The purpose of this book is to present some of the critical security challenges in today's computing...
Cryptography is an old idea and science, but its approach exists and plays a large role in moderniza...
This thesis is focused on encryption with Java libraries. Goal si to compare the libraries in the al...
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography ed...
This bachelor's thesis deals with description of cryptography and Public Key Infrastructure in Lotus...
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text cipher...
The aim of this bachelor thesis is to create a scripting language and a program (language interprete...
The goal of the paper is to analyse common problems of implementation of cryptographic algorithms, a...
Abstract. A new experience for teaching Cryptography to engineer-ing students is shown. The aim is t...
The point of this work is to show how to solve certain cryptographic problems in Microsoft .Net Fram...
In the present work we study applied cryptography. . . The goal of this work is not to study algorit...
This master thesis deals with a search of cryptographic primitives for embedded systems, which are t...
This paper describes an implementation of a Secure Coding learning package for Undergraduate student...
The purpose of the article is to describe main documents concerned with a personal data security. Th...
While cryptography is now readily available to everyone and can, provably, protect private informati...