Skip to main content
Article thumbnail
Location of Repository

Cryptographic Application Scenarios

By Vangelis Karatsiolis, Lucie Langer, Axel Schmidt, Erik Tews and Technische Universität Darmstadt


Abstract. The applications that use cryptography as well as the employed devices pose various requirements and constraints. These have to be considered during the development or analysis of cryptographic algorithms that are secure and practicable. This paper presents several real-world cryptographic applications. It also discusses typical cryptographic devices like smartcards. We provide therefore necessary data for evaluating the applicability of cryptographic algorithms

Topics: Cryptographic applications, PKI, eVoting, cryptographic devices
Year: 2011
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • http://www.cdc.informatik.tu-d... (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.