In the present work we study applied cryptography. . . The goal of this work is not to study algorithms from the mathematical or statistical view, instead we are trying to look at cryptography from a poin of view of the "end consumer or "programmmer. It should help the reader to find an appropriate algorithm for his program. The application on the end of the work is written to as readable as possible
As had been widely circulated special program data protection either freeware, shareware, and commer...
This paper provides an overview of the state of the art in the design of cryptographic algorithms an...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
The aim of this work is to compare some methods of file encryption. The main goal is to select the m...
Security of computer systems is becoming more important, because more users in more ways use more in...
The purpose of the article is to describe main documents concerned with a personal data security. Th...
Abstract: The purpose of this paper is to provide a survey of both the principle and practice of Cr...
Cryptography currently acting a decisive function in the era where millions of people are connected ...
Abstract — : Cryptography is that discover and study of methods and procedures for secure communicat...
(in English): This thesis describes and compares the most popular algorithms used in information sys...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
Abstract—Cryptography is being used by mankind in order to successfully transmit secret message with...
For most cases, people use an ecrypted mode when sending personal information to a server, via an el...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
Cryptography is a method of securing data using algorithms that have been developed continuously unt...
As had been widely circulated special program data protection either freeware, shareware, and commer...
This paper provides an overview of the state of the art in the design of cryptographic algorithms an...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
The aim of this work is to compare some methods of file encryption. The main goal is to select the m...
Security of computer systems is becoming more important, because more users in more ways use more in...
The purpose of the article is to describe main documents concerned with a personal data security. Th...
Abstract: The purpose of this paper is to provide a survey of both the principle and practice of Cr...
Cryptography currently acting a decisive function in the era where millions of people are connected ...
Abstract — : Cryptography is that discover and study of methods and procedures for secure communicat...
(in English): This thesis describes and compares the most popular algorithms used in information sys...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
Abstract—Cryptography is being used by mankind in order to successfully transmit secret message with...
For most cases, people use an ecrypted mode when sending personal information to a server, via an el...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
Cryptography is a method of securing data using algorithms that have been developed continuously unt...
As had been widely circulated special program data protection either freeware, shareware, and commer...
This paper provides an overview of the state of the art in the design of cryptographic algorithms an...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...