12 Hits in 4.7 sec

Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem [chapter]

Jean-Charles Faugère, Pierre-Jean Spaenlehauer
2010 Lecture Notes in Computer Science  
In this paper, we fully break the Algebraic Surface Cryptosystem (ASC for short) proposed at PKC'2009 [3].  ...  In this context, Akiyama, Goto, and Miyake propose a new multivariate publickey algorithm at PKC'2009: the Algebraic Surface Cryptosystem (ASC for short) [3] .  ...  We wish to thank the anonymous referees for their helpful comments and suggestions. We are also thankful to Maki Iwami for useful discussions.  ... 
doi:10.1007/978-3-642-13013-7_3 fatcat:wirttnpnv5bxjcwrqvzgwbioa4

The Impetus to Creativity in Technology

Alan G. Konheim
2015 Cryptologia  
While Horst Feistel did not directly participate to any of these commercial applications of cryptography, the traditional interpretation of the law of cause and effect certainly describes the effect of  ...  The emergence of E-Commerce in the next decades would far overshadow the value of encryption in banking business.  ...  It began with the study of block algebraic codes.  ... 
doi:10.1080/01611194.2015.1044816 fatcat:gf5mp6vsbrdt3glxeue7xmchqy

09221 Abstracts Collection – Algorithms and NumberTheory

Johannes A. Buchmann, John Cremona, Michael Pohst, Michael E. Pohst
Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper.  ...  The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.  ...  Correctnes of the fomulas was proved using the computer algebra system sage.  ... 
doi:10.4230/dagsemproc.09221.1 fatcat:tkhm4gej2bacveuc5crxngw42e

Group-based Cryptography in the Quantum Era [article]

Delaram Kahrobaei, Ramón Flores, Marialaura Noce
We then, describe some applications of combinatorail algebra in fully homomorphic encryption. In the end we discussing several open problems in this direction.  ...  In this expository article we present an overview of the current state-of-the-art in post-quantum group-based cryptography.  ...  Acknowledgements We note that because of the limitation of including citations in this forum we have omitted many references by the colleagues in this area.  ... 
doi:10.48550/arxiv.2202.05917 fatcat:hqfr6iytbzckfgbsllhldahqla

Subject Index to Volumes 1–75

2001 Information Processing Letters  
, 2043 system, 1259, 1481, 1603, 2018 test, 355 algebraic theory, 794, 2259 of concurrency, 1639 algebraic type, 620 algebraically, 275, 4006 equivalent expression, 145 specified abstract type, 448  ...  a longest path, 1828 shortest path, 505, 815, 816, 3985 length of the longest cycle, 3048 edge, 1254 string, 112 length of the word chain, 1959 word chains, 1462, 1959 length preserving rule  ...  a matrix, 3196 order n matrices, 623 tensors, 719 the adjacency matrix of a line graph, 252 rank one matrices, 1164 matrix, 472 rank queries, 1761 r decision trees, 2406 rankable set, 3245 ranked, 1610  ... 
doi:10.1016/s0020-0190(01)00175-2 fatcat:5y67tfm6yfbblakrus5nnhs73e

Bringing Theory Closer to Practice in Post-quantum and Leakage-resilient Cryptography

Alexandre Raphaël Duc
We introduce HELEN, a new public-key cryptosystem based on the hardness of the learning from parity with noise problem (LPN).  ...  Whereas ancient cryptography was only relying on heuristic assumptions and the secrecy of the designs, nowadays researchers try to make the security of schemes to rely on mathematical problems which are  ...  of all the intermediate computations in a block cipher, e.g. based on algebraic cryptanalysis (see [RS09a, RSV09] and follow up works).  ... 
doi:10.5075/epfl-thesis-6807 fatcat:tfizbfqfg5dhdgppyocy5wuj3i

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+77 others)
2018 International Journal of Network Security   unpublished
Nowadays, data hiding in compressed images becomes more and more popular because of the rise of the social media.  ...  Thus, we survey the previous research of data hiding of compressed images to provide the representative methods and analyze their capacities and bit rates.  ...  The authors dedicate this work to the Founder Chancellor, Sri Sathya Sai Institute of Higher Learning.  ... 

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+102 others)
2016 International Journal of Network Security   unpublished
The success of these attacks on the proposed mechanism dependence on trust score: lesser trust score (≤ 50) increases the chances of these attacks whereas higher trust score protects the network from these  ...  Trust management plays the role of maintaining the relationship between nodes for long endeavor.  ...  Acknowledgment The author gratefully acknowledged the financial support of My PhD from the Ministry of Education Malaysia.  ... 

On the Analysis of Public-Key Cryptologic Algorithms

Andrea Miele
scientific study of cryptography and cryptanalysis.  ...  for cryptanalysis.  ...  In the remainder of this chapter we focus on the approach from Section 6.2.2.  ... 
doi:10.5075/epfl-thesis-6603 fatcat:kijyxks7kvagtc7rj4lr6qreiu

List of Contributors [chapter]

Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
2019 Big Data Security  
between the study in cryptanalysis [9] and watermarking detection [10] .  ...  E Scale, 2009) [6] [7] [8] .  ...  The layer of data may afford an unusual solution at times as authentication or authorization of data may be different.  ... 
doi:10.1515/9783110606058-202 fatcat:3jtqdtgsavas7n3vxrtbrkdbdy

Strengthening trust in the identity life cycle [article]

Nicolas Buchmann, Universitätsbibliothek Der FU Berlin, Universitätsbibliothek Der FU Berlin
On the other hand, electronic travel documents are only one part of the document life cycle, since a passport can be obtained with an insecure birth certificate.  ...  On the one hand, utilised protocols and infrastructure are complex, partially not implemented, and have been found insecure in the presence of a large-scale quantum computer.  ...  QR codes have four levels of error correction which allow a reconstruction of barcodes with 7% to 30% unreadable surface.  ... 
doi:10.17169/refubium-1829 fatcat:23mb2ng5j5hddgpbmldt5xylfm

SECURWARE 2015 Committee SECURWARE Advisory Chairs

Rainer Falk, Hans-Joachim Hof, William Dougherty, Secern Consulting -Charlotte, Hans-Joachim Usa, Hof, Peter Müller, Syed Naqvi, Juha Rőning, Mariusz Jakubowski, Microsoft Research, William Dougherty (+163 others)
Some vulnerability can be addressed using the rule of 80:20, meaning 80% of the vulnerabilities can be addressed for 20% of the costs.  ...  We take here the opportunity to warmly thank all the members of the SECURWARE 2015 Technical Program Committee, as well as the numerous reviewers.  ...  ACKNOWLEDGMENT The authors acknowledge the financial support given to this work, under the project "Security Technologies for Mobile Environments -TSAM", granted by the  ...