Results 291 to 300 of about 1,726,359 (308)
Some of the next articles are maybe not open access.

Key-based partitioned bit-sliced signature file

ACM SIGIR Forum, 1995
A new signature file organization is proposed as a combination of two orthogonal partitioning strategies, the key-based and the bit-sliced, respectively. The design results from theoretical analysis of these elementary approaches in which performance is analytically studied respecting a simplified abstract storage structure model.
Zezula P., Ciaccia P., Tiberio P.
openaire   +2 more sources

Bit-Oriented Quantum Public Key Probabilistic Encryption Schemes

International Journal of Theoretical Physics, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zheng, Shihui, Gu, Lize, Xiao, Da
openaire   +1 more source

Optical key bit stream generator

Optical Engineering, 1999
A new optical stream cipher system based on a threshold generator used as a random key bit stream generator is presented. To implement the threshold generator optically, we use conventional twisted nematic type spatial light modulators (SLMs). This proposed system is based on the shadow casting technique for the AND operation between taps and register ...
openaire   +1 more source

Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys

2012
HyRAL is a blockcipher whose block size is 128 bits, and it supports the key lengths of 128, 129, …,256 bits. The cipher was proposed for the CRYPTREC project, and previous analyses did not identify any security weaknesses. In this paper, we consider the longest key version, 256-bit key HyRAL, and present the analysis in terms of equivalent keys. First,
Yuki Asano   +2 more
openaire   +1 more source

Odd-Bit Quadrature Amplitude-Shift Keying

IEEE Transactions on Communications, 1975
The selection of a particular signal set design for a bandwidth-constrained multiple amplitude-and-phase-amplitude-and-phase-shift-keyed (MAPSK) communication system with a linear additive Gaussian noise channel is influenced by a number of factors, such as average and/or peak signal-to-noise ratio for a given error probability, dynamic range of signal
openaire   +1 more source

1024-Bit/2048-Bit RSA Implementation on 32-Bit Processor for Public Key Cryptography

IETE Technical Review, 2002
In e-commerce, public key cryptography is used for signing, authentication, encryption and key exchange. Among all public key schemes, RSA has become very attractive due to its popularity and expiry of patent. Availability of high speed RSA algorithm will further give the impetus for the growth of e-commerce.
openaire   +1 more source

Achieving Perfect Secrecy with One Bit Keys

MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), 2018
Shannon perfect secrecy, also known as one-time pad, can only be achieved by using exactly a different key bit for each information bit. This requirement makes the implementation of perfect secrecy impractical in most applications. In this paper, a novel coding scheme for security is proposed that achieves perfect secrecy with only half a bit key per ...
Mohsen Karimzadeh Kiskani   +1 more
openaire   +1 more source

Key based bit level genetic cryptographic technique (KBGCT)

2011 7th International Conference on Information Assurance and Security (IAS), 2011
This is an encryption and decryption algorithm with the help of genetic functions cryptography. This new algorithm is developed for encryption and decryption process. This algorithm combines the features of Genetic Algorithm in Cryptography. Here we generate random numbers for “Crossover” and “Mutation”. The encryption and decryption algorithms will be
Subhranil Som   +2 more
openaire   +1 more source

Bit level symmetric key cryptography using genetic algorithm

2017 7th International Conference on Communication Systems and Network Technologies (CSNT), 2017
Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted.
Abhishek Sen, Attri Ghosh, Asoke Nath
openaire   +1 more source

Breaking Weak 1024-bit RSA Keys with CUDA

2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies, 2012
An exploit involving the greatest common divisor (GCD) of RSA moduli was recently discovered [1]. This paper presents a tool that can efficiently and completely compare a large number of 1024-bit RSA public keys, and identify any keys that are susceptible to this weakness.
Scharfglass, Kerry   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy