Results 31 to 40 of about 124 (57)

Image Encryption using Gingerbreadman Map And RC4A Stream Cipher [PDF]

open access: yes, 2020
Day to day increasing flow of sensitive or confidential information, such as images, audio, video, etc., over unsecured medium (like Internet) has motivated more concentration for concrete crypto algorithms.
Gaffar, Abdul   +2 more
core   +1 more source

mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography

open access: yesJournal of Mathematical Cryptology
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z.
Cianfriglia Marco   +2 more
doaj   +1 more source

Optimizations in the computation of pairings and cryptographic applications [PDF]

open access: yes, 2013
En la criptografía de clave pública actual el uso de curvas elípticas es cada vez más habitual debido a que ofrecen una seguridad similar a los ya utilizados cuerpos finitos, pero con unas claves más cortas.
Sánchez Charles, David
core   +1 more source

Differential experiments using parallel alternative operations

open access: yesJournal of Mathematical Cryptology
The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, is lately receiving increasing attention. Recently, Civino et al.
Calderini Marco   +2 more
doaj   +1 more source

Counting faces of randomly-projected polytopes when the projection radically lowers dimension [PDF]

open access: yes, 2006
This paper develops asymptotic methods to count faces of random high-dimensional polytopes. Beyond its intrinsic interest, our conclusions have surprising implications - in statistics, probability, information theory, and signal processing - with ...
Donoho, David L., Tanner, Jared
core  

Spectral analysis of the Lorenz attractor [PDF]

open access: yes
For a long time, chaos was considered uncontrollable and unusable. However, over the past thirty years, researchers have formulated equations for certain chaotic phenomena, revealing a deterministic aspect to what initially seems random. The evolution of
Aggoune, W.   +4 more
core   +2 more sources

Remarks to short RSA public exponents [PDF]

open access: yes, 1998
In this paper we discuss pertinent questions closely related to well known RSA cryptosystem [5]. From practical point of view it is reasonable to use as a public exponent an integer s = 2k+1, i.e., so called short exponent, with the lowest possible ...
Grošek, Otokar   +2 more
core   +1 more source

Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations [PDF]

open access: yes, 2020
Linear cryptanalysis considers correlations between linear input and output combiners for block ciphers and stream ciphers. Daemen and Rijmen (2007) had obtained the distributions of the correlations between linear input and output combiners of uniform ...
Palash Sarkar, Subhabrata Samajder
core  

Amplifying the Security of One-Way Functions — A Proof of Yao's XOR-Lemma [PDF]

open access: yes, 1996
In this paper we give a consistent and simple proof for the XOR-Lemma which was hinted at by Yao and subsequently presented by him in lectures. It can be found in print in "E. Kranakis, Primality and Cryptography, Wiley-Teubner Series in Computer Science,
Damm, Frank, Heider, Franz-Peter
core  

Multilayer Security of RGB Image in Discrete Hartley Domain [PDF]

open access: yes, 2020
In this article, we present RGB image encryption and decryption using random matrix affine cipher (RMAC) associated with discrete Hartley transform (DHT) and random matrix shift cipher (RMSC).
Lone, Parveiz N.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy