The aim of the final Master degree work is to create a method, algorithms and program for cryptographic security of text files. The algorithms of cryptographic security and algorithms aspects are analyzed in the work. Construct program is used for coding / decoding text files using Pseudo – Random Number Generator and it is applied to use in Windows operating system. The program and instructions for its user are formed. The experimental adaption of method and program is done. The program synthesis of coding / decoding text files is described.Švietimo akademijaVytauto Didžiojo universiteta
In this work we have discussed the following cryptographic protection methods: •elliptic cryptograph...
This master thesis deals with a search of cryptographic primitives for embedded systems, which are t...
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and...
Security of computer systems is becoming more important, because more users in more ways use more in...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
The goal of the paper is to analyse common problems of implementation of cryptographic algorithms, a...
This paper presents a process by which we can secure any kind of file. The newly developed encryptio...
The aim of this bachelor thesis is to create a scripting language and a program (language interprete...
This thesis deals with new teaching software, which supports asymmetric encryption algorithms based ...
In general secure data transfer between two communicating parties is done using several encryption a...
Abstract: An algorithm for fast software encryption is proposed in this paper. It is based on the ar...
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text cipher...
It is important to create a cryptographic system such that the encryption system does not depend on ...
This program helps you in coding and decoding texts using different historically important cipher te...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...
In this work we have discussed the following cryptographic protection methods: •elliptic cryptograph...
This master thesis deals with a search of cryptographic primitives for embedded systems, which are t...
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and...
Security of computer systems is becoming more important, because more users in more ways use more in...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
The goal of the paper is to analyse common problems of implementation of cryptographic algorithms, a...
This paper presents a process by which we can secure any kind of file. The newly developed encryptio...
The aim of this bachelor thesis is to create a scripting language and a program (language interprete...
This thesis deals with new teaching software, which supports asymmetric encryption algorithms based ...
In general secure data transfer between two communicating parties is done using several encryption a...
Abstract: An algorithm for fast software encryption is proposed in this paper. It is based on the ar...
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text cipher...
It is important to create a cryptographic system such that the encryption system does not depend on ...
This program helps you in coding and decoding texts using different historically important cipher te...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...
In this work we have discussed the following cryptographic protection methods: •elliptic cryptograph...
This master thesis deals with a search of cryptographic primitives for embedded systems, which are t...
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and...