Digital Watermarking Security [PDF]
<p>As creative works (e.g. books, films, music, photographs) become increasingly available in digital formats in a highly connected world, it also becomes increasingly difficult to secure intellectual property rights. Digital watermarking is one potential technology to aid intellectual property owners in controlling and tracking the use of their ...
Blake, Jonathan, Latifi, Shahram
openaire +6 more sources
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we call Multimixer-128. In our approach, we follow the key-then-hash parallel paradigm. So, we first add a variable length input message to a secret key and
Koustabh Ghosh +2 more
doaj +1 more source
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj +1 more source
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the
Yanis Belkheyar +4 more
doaj +1 more source
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
In ToSC 2018(4), Daemen et al. performed an in-depth investigation of sound hashing modes based on arbitrary functions, permutations, or block ciphers. However, for the case of invertible primitives, there is a glitch.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj +1 more source
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4
We present implementations of the lattice-based digital signature scheme Dilithium for ARM Cortex-M3 and ARM Cortex-M4. Dilithium is one of the three signature finalists of the NIST post-quantum cryptography competition.
Denisa O. C. Greconici +2 more
doaj +3 more sources
EFEKTIVITAS KERJASAMA UNITED KINGDOM DAN INDONESIA DALAM MENINGKATKAN DIGITAL SECURITY DI INDONESIA MELALUI UK-INDONESIA TECH HUB [PDF]
The digital ecosystem in Indonesia has been growing in recent years. The Covid-19 pandemic was the point where the number of online application users rose rapidly to 442%.
Feryzal, Mochammad
core
Economic Resilience of Indonesian Farmers: Statistical and Machine Learning Approach for Sustainable Agribusiness Strategy [PDF]
Farmers' economic resilience plays a critical role in sustaining agricultural systems and national food security. This study analyzes Indonesia's Farmer Terms of Trade (NTP) from 2022-2025 using a hybrid methodology that integrates descriptive ...
Fitro Achmad +3 more
doaj +1 more source
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96
Cryptographic competitions, like the ongoing NIST call for lightweight cryptography, always provide a thriving research environment, where new interesting ideas are proposed and new cryptographic insights are made. One proposal for this NIST call that is
Christoph Dobraunig +2 more
doaj +1 more source
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources

