Hybrid encryption algorithm based on symmetric and asymmetric ciphers

In trusted computing architecture, security is one of crucial aspects to protect the design against hardware or software attacks. The symmetric encryption method works great for fast encryption of large data. Still, it doesn’t provide identity verification. Meanwhile, the asymmetric encryption metho...

Full description

Saved in:
Bibliographic Details
Main Author: Mohd. Zulkimi, Noor Amira Zuraini
Format: Thesis
Language:English
Published: 2021
Subjects:
Online Access:http://eprints.utm.my/id/eprint/99497/1/NoorAmiraZurainiMKE2021.pdf
http://eprints.utm.my/id/eprint/99497/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:149817
Tags: Add Tag
No Tags, Be the first to tag this record!