The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mathematicians have always been fascinated by the subject of finding the prime numbers of large composite numbers. They have studied various methods and have focused on developing several theories. Nowadays, this problem is of practical importance because the security of the public key cryptosystems depends on the difficulty of factoring public keys. The integer factorization algorithms have rapidly...
A large part of the latest research in speech coding algorithms is motivated by the need of obtaining secure military communications, to allow effective operation in a hostile environment. Since the bandwidth of the communication channel is a sensitive problem in military applications, low bit-rate speech compression methods are mostly used. Several speech processing applications such as Mixed Excitation...
Link Layer Discovery Protocol (LLDP) and its extension for Media Endpoint Discovery (MED) is a Layer 2 protocol that allows an equipment to advertise its own capabilities. The protocol is robust and reliable and it works in multi-vendor environments, but the main problem is testing, since it requires two physical network equipments to exchange information. The problem gets more complicated when one...
Nowadays, public-key cryptography is widely used to ensure data protection (privacy, integrity, authentication). Public-key algorithms contain, as an essential part of their construction, the usage of prime numbers and of large composite numbers, which have prime factors. Because of this, the security of these algorithms such as RSA (Rivest-Shamir-Adelman) depend on the difficulty to factorize the...
The importance of protecting the information has increased rapidly during the last decades and as a consequence so did the need for cryptographic algorithms. We want to increase the speed of these methods that protect our data as much as we can. In this paper, we used parallelism for encryption algorithms and I/O operations to emphasize the benefit of it, by implementing and improving two cryptographic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.