2010
DOI: 10.1007/978-3-642-04101-3
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
233
0
35

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 650 publications
(330 citation statements)
references
References 0 publications
0
233
0
35
Order By: Relevance
“…When electro-magnetic (EM) emission data collected by EM probe is used, the attack is called SEMA (Simple electro-magnetic analysis). DPA [6] is usually used in the attack against symmetric ciphers such as DES [5] or AES [5] algorithms. In the DPA, the attacker requires a large number of power traces in contrast to SPA.…”
Section: The Categories Of Scasmentioning
confidence: 99%
“…When electro-magnetic (EM) emission data collected by EM probe is used, the attack is called SEMA (Simple electro-magnetic analysis). DPA [6] is usually used in the attack against symmetric ciphers such as DES [5] or AES [5] algorithms. In the DPA, the attacker requires a large number of power traces in contrast to SPA.…”
Section: The Categories Of Scasmentioning
confidence: 99%
“…A line from the first point P to the second point Q will be draw to get the third point R by crossing between the line and EC plane. Mirror R crossing point on the xaxis to obtain mirrored R, Figure (2) demonstrates the point addition [2]. …”
Section: Point Addition (P+q)mentioning
confidence: 99%
“…The fundamental benefit in use of ECC technique is by providing same protection level with a smaller key length compared to RSA, thus will reduces the processing overhead and the processing time [1,2]. The ECC technique basically is more complicated to illustrate than either Diffie-Hellman or RSA.…”
Section: Introductionmentioning
confidence: 99%
“…The Digital environment while providing data communication, from the sender to the recipient data unauthorized access, damage, prevent as there are many threats. These threats for the elimination of many encryption technique improved [2,[6][7][8][9]. Cryptography is the all of mathematical technical studies related to information security.…”
Section: Introductionmentioning
confidence: 99%
“…Advanced Encryption Standard (AES) method is the most used. Figure-1 also shows a symmetrical crypto system [2,7,8,9,10,11]. Steganography is come into question to hide a text as a complementary security solution at this point.…”
Section: Introductionmentioning
confidence: 99%