Results 31 to 40 of about 124 (57)
Image Encryption using Gingerbreadman Map And RC4A Stream Cipher [PDF]
Day to day increasing flow of sensitive or confidential information, such as images, audio, video, etc., over unsecured medium (like Internet) has motivated more concentration for concrete crypto algorithms.
Gaffar, Abdul +2 more
core +1 more source
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z.
Cianfriglia Marco +2 more
doaj +1 more source
Optimizations in the computation of pairings and cryptographic applications [PDF]
En la criptografía de clave pública actual el uso de curvas elípticas es cada vez más habitual debido a que ofrecen una seguridad similar a los ya utilizados cuerpos finitos, pero con unas claves más cortas.
Sánchez Charles, David
core +1 more source
Differential experiments using parallel alternative operations
The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, is lately receiving increasing attention. Recently, Civino et al.
Calderini Marco +2 more
doaj +1 more source
Counting faces of randomly-projected polytopes when the projection radically lowers dimension [PDF]
This paper develops asymptotic methods to count faces of random high-dimensional polytopes. Beyond its intrinsic interest, our conclusions have surprising implications - in statistics, probability, information theory, and signal processing - with ...
Donoho, David L., Tanner, Jared
core
Spectral analysis of the Lorenz attractor [PDF]
For a long time, chaos was considered uncontrollable and unusable. However, over the past thirty years, researchers have formulated equations for certain chaotic phenomena, revealing a deterministic aspect to what initially seems random. The evolution of
Aggoune, W. +4 more
core +2 more sources
Remarks to short RSA public exponents [PDF]
In this paper we discuss pertinent questions closely related to well known RSA cryptosystem [5]. From practical point of view it is reasonable to use as a public exponent an integer s = 2k+1, i.e., so called short exponent, with the lowest possible ...
Grošek, Otokar +2 more
core +1 more source
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations [PDF]
Linear cryptanalysis considers correlations between linear input and output combiners for block ciphers and stream ciphers. Daemen and Rijmen (2007) had obtained the distributions of the correlations between linear input and output combiners of uniform ...
Palash Sarkar, Subhabrata Samajder
core
Amplifying the Security of One-Way Functions — A Proof of Yao's XOR-Lemma [PDF]
In this paper we give a consistent and simple proof for the XOR-Lemma which was hinted at by Yao and subsequently presented by him in lectures. It can be found in print in "E. Kranakis, Primality and Cryptography, Wiley-Teubner Series in Computer Science,
Damm, Frank, Heider, Franz-Peter
core
Multilayer Security of RGB Image in Discrete Hartley Domain [PDF]
In this article, we present RGB image encryption and decryption using random matrix affine cipher (RMAC) associated with discrete Hartley transform (DHT) and random matrix shift cipher (RMSC).
Lone, Parveiz N. +3 more
core +1 more source

