Patel, 2016 - Google Patents
CryptographyPatel, 2016
- Document ID
- 414507156826992493
- Author
- Patel R
- Publication year
- Publication venue
- Engineering & Technology Reference
External Links
Snippet
This article is an overview of cryptography and its application across different components within a typical technology platform. It discusses different cryptographic approaches and touches on trending requirements for cryptography. This is a fast developing field that is …
- 238000005516 engineering process 0 abstract description 33
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/016—Input arrangements with force or tactile feedback as computer generated output to the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/48—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
- G06F7/4806—Computations with complex numbers
- G06F7/4818—Computations with complex numbers using coordinate rotation digital computer [CORDIC]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6869374B2 (en) | Decentralized key management for trusted execution environments | |
US10142107B2 (en) | Token binding using trust module protected keys | |
US10999276B2 (en) | Industrial internet encryption system | |
CN111431713B (en) | Private key storage method and device and related equipment | |
US20210357914A1 (en) | Constructing a Distributed Ledger Transaction on a Cold Hardware Wallet | |
US20170171183A1 (en) | Authentication of access request of a device and protecting confidential information | |
CN115549887A (en) | Determination of a common secret and hierarchical deterministic keys for the secure exchange of information | |
Velliangiri et al. | An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography | |
CN113316798B (en) | Methods, systems, and computer program products for network binding agent re-encryption and PIN translation | |
SE1451210A1 (en) | Generating a symmetric encryption key | |
JP2022546470A (en) | Decentralized techniques for validation of data in transport layer security and other contexts | |
SE540133C2 (en) | Improved system for establishing a secure communication channel | |
US20230163967A1 (en) | Decentralized authorization of user access requests in a multi-tenant distributed service architecture | |
Akinyede et al. | Development of a secure mobile e-banking system | |
Yildiz et al. | Towards Interoperable Self-sovereign Identities | |
CN117176353A (en) | Method and device for processing data | |
Sharma et al. | A two-tier security solution for storing data across public cloud | |
Salim et al. | Design and implementation of a secure mobile banking system based on elliptic curve integrated encryption schema | |
Ortiz-Yepes | Enhancing Authentication in eBanking with NFC-enabled mobile phones | |
van Oorschot | Public key cryptography’s impact on society: how Diffie and Hellman changed the world | |
Patel | Cryptography | |
Bai et al. | Ensuring Security at Data Level in Cloud using Multi Cloud Architecture | |
Shi et al. | Verification of LINE encryption version 1.0 using proverif | |
Wu et al. | A Robust Two Factor Authentication Scheme with Fine Grained Biometrics Verification | |
Gagged et al. | Improved secure dynamic bit standard technique for a private cloud platform to address security challenges |