Sciweavers

125 search results - page 4 / 25
» Symmetric Cryptography in Javascript
Sort
View
ICDCSW
2007
IEEE
14 years 2 days ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
ITCC
2005
IEEE
13 years 11 months ago
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography
1 Table lookups are one of the most frequently-used operations in symmetric-key ciphers. Particularly in the newer algorithms such as the Advanced Encryption Standard (AES), we fr...
A. Murat Fiskiran, Ruby B. Lee
DAGSTUHL
2007
13 years 7 months ago
07021 Abstracts Collection -- Symmetric Cryptography
Eli Biham, Helena Handschuh, Stefan Lucks, Vincent...
IJNSEC
2010
163views more  IJNSEC 2010»
13 years 18 days ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
COMPSYSTECH
2010
13 years 6 months ago
An approach for node identification and key management in sensor grids
Security of sensor grids is important especially for surveillance, military and medical applications. The paper addresses methods for two security features. First, an approach for ...
Iliya Georgiev