A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem
[chapter]
2010
Lecture Notes in Computer Science
In this paper, we fully break the Algebraic Surface Cryptosystem (ASC for short) proposed at PKC'2009 [3]. ...
In this context, Akiyama, Goto, and Miyake propose a new multivariate publickey algorithm at PKC'2009: the Algebraic Surface Cryptosystem (ASC for short) [3] . ...
We wish to thank the anonymous referees for their helpful comments and suggestions. We are also thankful to Maki Iwami for useful discussions. ...
doi:10.1007/978-3-642-13013-7_3
fatcat:wirttnpnv5bxjcwrqvzgwbioa4
The Impetus to Creativity in Technology
2015
Cryptologia
While Horst Feistel did not directly participate to any of these commercial applications of cryptography, the traditional interpretation of the law of cause and effect certainly describes the effect of ...
The emergence of E-Commerce in the next decades would far overshadow the value of encryption in banking business. ...
It began with the study of block algebraic codes. ...
doi:10.1080/01611194.2015.1044816
fatcat:gf5mp6vsbrdt3glxeue7xmchqy
09221 Abstracts Collection – Algorithms and NumberTheory
2009
Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. ...
The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available. ...
Correctnes of the fomulas was proved using the computer algebra system sage. ...
doi:10.4230/dagsemproc.09221.1
fatcat:tkhm4gej2bacveuc5crxngw42e
Group-based Cryptography in the Quantum Era
[article]
2022
We then, describe some applications of combinatorail algebra in fully homomorphic encryption. In the end we discussing several open problems in this direction. ...
In this expository article we present an overview of the current state-of-the-art in post-quantum group-based cryptography. ...
Acknowledgements We note that because of the limitation of including citations in this forum we have omitted many references by the colleagues in this area. ...
doi:10.48550/arxiv.2202.05917
fatcat:hqfr6iytbzckfgbsllhldahqla
Subject Index to Volumes 1–75
2001
Information Processing Letters
, 2043 system, 1259, 1481, 1603, 2018 test, 355 algebraic theory, 794, 2259 of concurrency, 1639 algebraic type, 620 algebraically, 275, 4006 equivalent expression, 145 specified abstract type, 448 ...
a
longest path, 1828
shortest path, 505, 815, 816, 3985
length of the longest
cycle, 3048
edge, 1254
string, 112
length of
the word chain, 1959
word chains, 1462, 1959
length
preserving rule ...
a matrix, 3196 order n matrices, 623 tensors, 719 the adjacency matrix of a line graph, 252 rank one matrices, 1164 matrix, 472 rank queries, 1761 r decision trees, 2406 rankable set, 3245 ranked, 1610 ...
doi:10.1016/s0020-0190(01)00175-2
fatcat:5y67tfm6yfbblakrus5nnhs73e
Bringing Theory Closer to Practice in Post-quantum and Leakage-resilient Cryptography
2015
We introduce HELEN, a new public-key cryptosystem based on the hardness of the learning from parity with noise problem (LPN). ...
Whereas ancient cryptography was only relying on heuristic assumptions and the secrecy of the designs, nowadays researchers try to make the security of schemes to rely on mathematical problems which are ...
of all the intermediate computations in a block cipher, e.g. based on algebraic cryptanalysis (see [RS09a, RSV09] and follow up works). ...
doi:10.5075/epfl-thesis-6807
fatcat:tfizbfqfg5dhdgppyocy5wuj3i
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2018
International Journal of Network Security
unpublished
Nowadays, data hiding in compressed images becomes more and more popular because of the rise of the social media. ...
Thus, we survey the previous research of data hiding of compressed images to provide the representative methods and analyze their capacities and bit rates. ...
The authors dedicate this work to the Founder Chancellor, Sri Sathya Sai Institute of Higher Learning. ...
fatcat:l5qol3fgizghrkdel7sgt3qz6q
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
The success of these attacks on the proposed mechanism dependence on trust score: lesser trust score (≤ 50) increases the chances of these attacks whereas higher trust score protects the network from these ...
Trust management plays the role of maintaining the relationship between nodes for long endeavor. ...
Acknowledgment The author gratefully acknowledged the financial support of My PhD from the Ministry of Education Malaysia. ...
fatcat:ez6kvrzkuzg75nulaxycvfvxcq
On the Analysis of Public-Key Cryptologic Algorithms
2015
scientific study of cryptography and cryptanalysis. ...
for cryptanalysis. ...
In the remainder of this chapter we focus on the approach from Section 6.2.2. ...
doi:10.5075/epfl-thesis-6603
fatcat:kijyxks7kvagtc7rj4lr6qreiu
List of Contributors
[chapter]
2019
Big Data Security
between the study in cryptanalysis [9] and watermarking detection [10] . ...
E Scale, 2009) [6] [7] [8] . ...
The layer of data may afford an unusual solution at times as authentication or authorization of data may be different. ...
doi:10.1515/9783110606058-202
fatcat:3jtqdtgsavas7n3vxrtbrkdbdy
Strengthening trust in the identity life cycle
[article]
2019
On the other hand, electronic travel documents are only one part of the document life cycle, since a passport can be obtained with an insecure birth certificate. ...
On the one hand, utilised protocols and infrastructure are complex, partially not implemented, and have been found insecure in the presence of a large-scale quantum computer. ...
QR codes have four levels of error correction which allow a reconstruction of barcodes with 7% to 30% unreadable surface. ...
doi:10.17169/refubium-1829
fatcat:23mb2ng5j5hddgpbmldt5xylfm
SECURWARE 2015 Committee SECURWARE Advisory Chairs
unpublished
Some vulnerability can be addressed using the rule of 80:20, meaning 80% of the vulnerabilities can be addressed for 20% of the costs. ...
We take here the opportunity to warmly thank all the members of the SECURWARE 2015 Technical Program Committee, as well as the numerous reviewers. ...
ACKNOWLEDGMENT The authors acknowledge the financial support given to this work, under the project "Security Technologies for Mobile Environments -TSAM", granted by the ...
fatcat:xebt7atkmzcy5mu3yabwgyczye