Results 1 to 10 of about 62,040 (316)

Decryption of historical manuscripts: the DECRYPT project [PDF]

open access: yesCryptologia, 2020
Many historians and linguists are working individually and in an uncoordinated fashion on the identification and decryption of historical ciphers. This is a time-consuming process as they often work without access to automatic methods and processes that can accelerate the decipherment.
Megyesi, B.   +9 more
openaire   +3 more sources

Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]

open access: yes, 2003
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad   +17 more
core   +2 more sources

Ad Hoc Multi-Input Functional Encryption [PDF]

open access: yes, 2019
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta   +5 more
core   +2 more sources

Image quality and security through nonlinear joint transform encryption [PDF]

open access: yes, 2016
Postprint (published ...
Millán Garcia-Varela, M. Sagrario   +2 more
core   +1 more source

Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]

open access: yes, 2019
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario   +2 more
core   +2 more sources

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

General Impossibility of Group Homomorphic Encryption in the Quantum World [PDF]

open access: yes, 2014
Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation.
Armknecht, Frederik   +3 more
core   +5 more sources

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

DeCrypt: a 3DES inspired optimised cryptographic algorithm

open access: yesJournal of Ambient Intelligence and Humanized Computing, 2022
Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications.
Deepraj Chowdhury   +6 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy