The point of this work is to show how to solve certain cryptographic problems in Microsoft .Net Framework 3.5. The work is divided into three parts. The first is an overview of basic classes and methods which can be used to solve particular cryptographic tasks. This part shows how to use these classes and also is an overview of the most common cryptological terminology also used in this work. The second part shows how to use abstract classes prepared in the framework for implementing an application interface, which unifies usage of all cryptographic transformations under .net. The third part is about deciding on quality of certain implemented cryptographic algorithm. Implementing speed testing application for block ciphers and hash function...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
Abstract — : Cryptography is that discover and study of methods and procedures for secure communicat...
In today’s world of internet technology that covers especially communication network security is a c...
Cryptography is an old idea and science, but its approach exists and plays a large role in moderniza...
The goal of the paper is to analyse common problems of implementation of cryptographic algorithms, a...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...
When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of ...
When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of ...
Scope of the material This material is mainly intended for students following lectures on Cryptograp...
This thesis consists of an introductory part of how the symmetric cipher AES works in detail and how...
Bachelor's thesis deals with analysis of the various cryptographic algorithms that are used for secu...
This report reviews the entire process of implementing the web demonstration of the Secure Hash Algo...
This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, wher...
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography ed...
The objective of this project is to build an interactive web-based application to cater for various ...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
Abstract — : Cryptography is that discover and study of methods and procedures for secure communicat...
In today’s world of internet technology that covers especially communication network security is a c...
Cryptography is an old idea and science, but its approach exists and plays a large role in moderniza...
The goal of the paper is to analyse common problems of implementation of cryptographic algorithms, a...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...
When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of ...
When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of ...
Scope of the material This material is mainly intended for students following lectures on Cryptograp...
This thesis consists of an introductory part of how the symmetric cipher AES works in detail and how...
Bachelor's thesis deals with analysis of the various cryptographic algorithms that are used for secu...
This report reviews the entire process of implementing the web demonstration of the Secure Hash Algo...
This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, wher...
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography ed...
The objective of this project is to build an interactive web-based application to cater for various ...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
Abstract — : Cryptography is that discover and study of methods and procedures for secure communicat...
In today’s world of internet technology that covers especially communication network security is a c...