Comparing the speed of the selected hash and encryption algorithms

The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library fo...

Full description

Bibliographic Details
Main Authors: Dawid Górniak, Piotr Kopniak
Format: Article
Language:English
Published: Lublin University of Technology 2017-09-01
Series:Journal of Computer Sciences Institute
Subjects:
Online Access:https://ph.pollub.pl/index.php/jcsi/article/view/598