Quantcast
Channel: Protogenist Blog » encryption
Browsing latest articles
Browse All 6 View Live

Image may be NSFW.
Clik here to view.

Limitations of Modern Cryptosystems

Before exploring quantum key distribution, it is important to understand the state of modern cryptography and how quantum cryptography may address current digital cryptography limitations. Since public...

View Article



Image may be NSFW.
Clik here to view.

A Comparison between Subtree Encryption and Server side Access Control

SUBTREE ENCRYPTION Subtree encryption (element wise) is a good and straight-forward solution for XML Encryption and it will fit into most situations. The encrypted entity can be transferred to the...

View Article

Image may be NSFW.
Clik here to view.

Encryption and Digital Signature

Digital signature The process of digitally signing starts by taking a mathematical summary (called a hash code) of the message. This hash code is a uniquely identifying digital fingerprint of the...

View Article

Image may be NSFW.
Clik here to view.

C14N Denial of Service

Attack surface: Canonicalization Attack impact: Denial of service Description: C14N can be an expensive operation, requiring complex processing (Boyer ‟01), including entity expansion and normalization...

View Article

Image may be NSFW.
Clik here to view.

MySQL’s Core Feature Set for Data Warehousing

MySQL contains a solid core feature set that is suitable for all data warehousing use cases. The following are just some of the features in the MySQL database server that help enable data warehousing:...

View Article


Image may be NSFW.
Clik here to view.

Public Key Cryptography

The purpose of a digital signature is to provide a means for an entity to bind its identity to a piece of information. Digital signatures use PKC (Public Key Cryptography), which employs an algorithm...

View Article
Browsing latest articles
Browse All 6 View Live




Latest Images