메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 233-237

Timing evaluation of the known cryptographic algorithms

Author keywords

AES; Random number; RSA; Time consuming; Triple DES

Indexed keywords

CRYPTOGRAPHIC ALGORITHMS; EVALUATING MODELS; EVALUATION MODELS; GENERATING MECHANISM; PLAINTEXT; RANDOM NUMBERS; REFERENCE VALUES; RUNTIMES;

EID: 77949289802     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2009.81     Document Type: Conference Paper
Times cited : (15)

References (7)
  • 1
    • 77949285441 scopus 로고    scopus 로고
    • Hans Delfs, Helmut Knebl. Introduction to Cryptography:Principles and Applications. Tsinghua University Press, 2007.10.
    • Hans Delfs, Helmut Knebl. "Introduction to Cryptography:Principles and Applications". Tsinghua University Press, 2007.10.
  • 3
    • 77949291667 scopus 로고    scopus 로고
    • Willian Stallings, Cryptography and Network Security: principles and Practice. Tsinghua University Press, 2002.6.
    • Willian Stallings, "Cryptography and Network Security: principles and Practice". Tsinghua University Press, 2002.6.
  • 5
    • 77949298850 scopus 로고    scopus 로고
    • Behrouz A.Forouzan, Sophia Chung Fegan, TCP/IP Protocol Suite (Second Edition). Tsinghua University Press, 2004.1.
    • Behrouz A.Forouzan, Sophia Chung Fegan, "TCP/IP Protocol Suite (Second Edition)". Tsinghua University Press, 2004.1.
  • 6
    • 77949288207 scopus 로고    scopus 로고
    • Robert J.McEliece. The Theory of Information and Coding (Second Edition). Publishing House of Electronics Industry, 2003.1.
    • Robert J.McEliece. "The Theory of Information and Coding" (Second Edition). Publishing House of Electronics Industry, 2003.1.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.