Results 41 to 50 of about 172 (89)

Amplifying the Security of One-Way Functions — A Proof of Yao's XOR-Lemma [PDF]

open access: yes, 1996
In this paper we give a consistent and simple proof for the XOR-Lemma which was hinted at by Yao and subsequently presented by him in lectures. It can be found in print in "E. Kranakis, Primality and Cryptography, Wiley-Teubner Series in Computer Science,
Damm, Frank, Heider, Franz-Peter
core  

Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations [PDF]

open access: yes, 2020
Linear cryptanalysis considers correlations between linear input and output combiners for block ciphers and stream ciphers. Daemen and Rijmen (2007) had obtained the distributions of the correlations between linear input and output combiners of uniform ...
Palash Sarkar, Subhabrata Samajder
core  

Cross-primitive comparison in CP-ABE

open access: yesJournal of Mathematical Cryptology
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a cornerstone technique for fine-grained access control in encrypted data sharing, with pairing-based schemes having established the de facto standard.
Gasparini Lorenzo   +3 more
doaj   +1 more source

Using shifted conjugacy in braid-based cryptography

open access: yes, 2006
Conjugacy is not the only possible primitive for designing braid-based protocols. To illustrate this principle, we describe a Fiat--Shamir-style authentication protocol that be can be implemented using any binary operation that satisfies the left self ...
Dehornoy, Patrick
core   +1 more source

Color image encryption and decryption using Hill Cipher associated with Arnold transform [PDF]

open access: yes, 2016
Image security over open network transmission is a big concern nowadays. This paper proposes another methodology for color image encoding and decoding using two stage Hill Cipher method which is connected with Arnold Transformation.
Hanmandlu, M.   +2 more
core   +1 more source

Encryption of Color Images Based on Chaotic Attractors Generated by ODE Systems Containing Module Nonlinearities [PDF]

open access: yes
The main objective of this work is to construct an algorithm for modeling chaotic attractors using special neural ODEs with antisymmetric matrices (antisymmetric neural ODEs) and modular power nonlinearities.
Belozyorov, Vasiliy Ye.   +2 more
core   +2 more sources

Homoclinic and Heteroclinic Neural ODEs: Theory and Its Use to Construct New Chaotic Attractors [PDF]

open access: yes
New types of neural ordinary differential equations (NODE) with power nonlinearities are considered. For these NODE systems, new conditions for the existence of homoclinic and heteroclinic orbits are found.
Belozyorov, Vasiliy Ye.   +2 more
core   +2 more sources

Using Circle Map for Audio Encryption Algorithm [PDF]

open access: yes, 2017
In this paper we propose audio encryption algorithm based on standard circle map. The proposed scheme contains bit level sample permutation using pseudorandom generator.
Bonchev, Lachezar, Kordov, Krasimir
core   +1 more source

Information Hiding with Data Diffusion Using Convolutional Encoding for Super-Encryption [PDF]

open access: yes, 2017
The unification of data encryption with information hiding methods continues to receive significant attention because of the importance of protecting encrypted information by making it covert.
Adolfo, C.M.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy