A Performance-Centric Comparative Study of Hybrid Security Protocol Architectures
暂无分享,去创建一个
[1] J. Ferrer. A new privacy homomorphism and applications , 1996 .
[2] S. Subasree,et al. DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS , 2010 .
[3] Alexander May,et al. New Attacks on RSA with Small Secret CRT-Exponents , 2006, Public Key Cryptography.
[4] A. Sinhal,et al. A novel approach to the design of a new hybrid security protocol architecture , 2012, 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).
[5] Hung-Min Sun,et al. Dual RSA and Its Security Analysis , 2007, IEEE Transactions on Information Theory.
[6] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[7] Baodian Wei,et al. An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[8] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[9] M. Hemalatha,et al. A design of security protocol using hybrid encryption technique (AES-Rijndael and RSA) , 2009 .
[10] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.