Results 1 to 10 of about 62,040 (316)
Decryption of historical manuscripts: the DECRYPT project [PDF]
Many historians and linguists are working individually and in an uncoordinated fashion on the identification and decryption of historical ciphers. This is a time-consuming process as they often work without access to automatic methods and processes that can accelerate the decipherment.
Megyesi, B. +9 more
openaire +3 more sources
Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad +17 more
core +2 more sources
Ad Hoc Multi-Input Functional Encryption [PDF]
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta +5 more
core +2 more sources
Image quality and security through nonlinear joint transform encryption [PDF]
Postprint (published ...
Millán Garcia-Varela, M. Sagrario +2 more
core +1 more source
Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario +2 more
core +2 more sources
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core +3 more sources
General Impossibility of Group Homomorphic Encryption in the Quantum World [PDF]
Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation.
Armknecht, Frederik +3 more
core +5 more sources
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram +2 more
core +2 more sources
Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio +46 more
core +2 more sources
DeCrypt: a 3DES inspired optimised cryptographic algorithm
Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications.
Deepraj Chowdhury +6 more
openaire +2 more sources

