Amplifying the Security of One-Way Functions — A Proof of Yao's XOR-Lemma [PDF]
In this paper we give a consistent and simple proof for the XOR-Lemma which was hinted at by Yao and subsequently presented by him in lectures. It can be found in print in "E. Kranakis, Primality and Cryptography, Wiley-Teubner Series in Computer Science,
Damm, Frank, Heider, Franz-Peter
core
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations [PDF]
Linear cryptanalysis considers correlations between linear input and output combiners for block ciphers and stream ciphers. Daemen and Rijmen (2007) had obtained the distributions of the correlations between linear input and output combiners of uniform ...
Palash Sarkar, Subhabrata Samajder
core
Cross-primitive comparison in CP-ABE
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a cornerstone technique for fine-grained access control in encrypted data sharing, with pairing-based schemes having established the de facto standard.
Gasparini Lorenzo +3 more
doaj +1 more source
Using shifted conjugacy in braid-based cryptography
Conjugacy is not the only possible primitive for designing braid-based protocols. To illustrate this principle, we describe a Fiat--Shamir-style authentication protocol that be can be implemented using any binary operation that satisfies the left self ...
Dehornoy, Patrick
core +1 more source
Color image encryption and decryption using Hill Cipher associated with Arnold transform [PDF]
Image security over open network transmission is a big concern nowadays. This paper proposes another methodology for color image encoding and decoding using two stage Hill Cipher method which is connected with Arnold Transformation.
Hanmandlu, M. +2 more
core +1 more source
Encryption of Color Images Based on Chaotic Attractors Generated by ODE Systems Containing Module Nonlinearities [PDF]
The main objective of this work is to construct an algorithm for modeling chaotic attractors using special neural ODEs with antisymmetric matrices (antisymmetric neural ODEs) and modular power nonlinearities.
Belozyorov, Vasiliy Ye. +2 more
core +2 more sources
Homoclinic and Heteroclinic Neural ODEs: Theory and Its Use to Construct New Chaotic Attractors [PDF]
New types of neural ordinary differential equations (NODE) with power nonlinearities are considered. For these NODE systems, new conditions for the existence of homoclinic and heteroclinic orbits are found.
Belozyorov, Vasiliy Ye. +2 more
core +2 more sources
Rumour prevention in social networks with layer 2 blockchains. [PDF]
Thakur S, Breslin JG.
europepmc +1 more source
Using Circle Map for Audio Encryption Algorithm [PDF]
In this paper we propose audio encryption algorithm based on standard circle map. The proposed scheme contains bit level sample permutation using pseudorandom generator.
Bonchev, Lachezar, Kordov, Krasimir
core +1 more source
Information Hiding with Data Diffusion Using Convolutional Encoding for Super-Encryption [PDF]
The unification of data encryption with information hiding methods continues to receive significant attention because of the importance of protecting encrypted information by making it covert.
Adolfo, C.M. +3 more
core +1 more source

