Currently, the cryptographic algorithms are not sufficiently studied. Thus, a threat to information security remains an urgent issue. A perfect mathematical and software implementation of these algorithms is not available. Therefore, in this thesis, improved mathematical and software implementation of symmetric and asymmetric encryption algorithms are mentioned
This thesis analyzes various attacks on underlying computational problem of asymmetric cryptosystems...
The goal of this thesis is to describe principles of public-key cryptography, introduce and compare ...
Today, the stability of modern asymmetric algorithms, unlike the stability of symmetric ciphers, is ...
Data protection is a complex problem affecting many areas including computers and communications. To...
In these days securing a network is an important issue. Many techniques are provided to secure netwo...
Data security is the challenging issue in todaysworld that touches many areas using computercommunic...
Cryptography is the process of securely transmission of data. Cryptography is the process of Encrypt...
Abstract-- The present era resembles the digital world, in which everything irrespective of technolo...
Cryptography considered being the most vital component in information security because it is respons...
Abstract:Information security is the process of protecting information. It protects its availability...
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The ...
In the world of today, computer and Internet have become part of our everyday lives. Security for da...
Cyber security ensures a secure information exchange and enables communication through the Internet....
Abstract — Nowadays, the use of internet are growing increasingly across the world, security becomes...
This document gives a synthetic overview of my research since 2006. It is focused on algorithms for ...
This thesis analyzes various attacks on underlying computational problem of asymmetric cryptosystems...
The goal of this thesis is to describe principles of public-key cryptography, introduce and compare ...
Today, the stability of modern asymmetric algorithms, unlike the stability of symmetric ciphers, is ...
Data protection is a complex problem affecting many areas including computers and communications. To...
In these days securing a network is an important issue. Many techniques are provided to secure netwo...
Data security is the challenging issue in todaysworld that touches many areas using computercommunic...
Cryptography is the process of securely transmission of data. Cryptography is the process of Encrypt...
Abstract-- The present era resembles the digital world, in which everything irrespective of technolo...
Cryptography considered being the most vital component in information security because it is respons...
Abstract:Information security is the process of protecting information. It protects its availability...
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The ...
In the world of today, computer and Internet have become part of our everyday lives. Security for da...
Cyber security ensures a secure information exchange and enables communication through the Internet....
Abstract — Nowadays, the use of internet are growing increasingly across the world, security becomes...
This document gives a synthetic overview of my research since 2006. It is focused on algorithms for ...
This thesis analyzes various attacks on underlying computational problem of asymmetric cryptosystems...
The goal of this thesis is to describe principles of public-key cryptography, introduce and compare ...
Today, the stability of modern asymmetric algorithms, unlike the stability of symmetric ciphers, is ...