Hybrid encryption algorithm based on symmetric and asymmetric ciphers

In trusted computing architecture, security is one of crucial aspects to protect the design against hardware or software attacks. The symmetric encryption method works great for fast encryption of large data. Still, it doesn’t provide identity verification. Meanwhile, the asymmetric encryption metho...

Description complète

Détails bibliographiques
Auteur principal: Mohd. Zulkimi, Noor Amira Zuraini
Format: Thèse
Langue:anglais
Publié: 2021
Sujets:
Accès en ligne:http://eprints.utm.my/99497/1/NoorAmiraZurainiMKE2021.pdf