George Mason University
ECE 646 — Cryptography and Computer Network Security
180 documents • ranked by quality and engagement.
No description provided
Number Field Sieve Matrix Step for Factoring
AbsoluteProof for Record Integrity
Efficient Smart Card Crypto Implementations
Benchmarking Crypto Library Educational Software
Crypto Lab Educational Software
Capabilities of Network Processors (Crypto)
Crypto Capabilities of Network Processors
Deterministic Methods for RSA Large Prime Construction
Email Security S-MIME vs PGP
NTRU Public Key Cryptosystem JCE Implementation Performance
Generators for True Random Numbers
ITLS vs WTLS End-to-End Wireless Security Comparison
Overview of Steganography
Current Trends in ATM Network Security
Specifications for SPI-2
Wireless Ad Hoc Network Security Measures
Analysis of Security in RFID Systems
Public Key Cryptosystem Performance
Block Cipher Operation Modes
Slides for Cryptography Lecture
Lecture 7 DES and Extensions
Historical Ciphers Lecture 6
Concepts of Cryptology Lecture 2
Security Protocols Concepts Lecture 12