Filters








1,882 Hits in 4.3 sec

Optimal Difference Systems of Sets with Multipliers [chapter]

Vladimir D. Tonchev, Hao Wang
2006 Lecture Notes in Computer Science  
Tonchev, Symmetric (4, 4)-nets and generalized Hadamard matrices over groups of order 4, Designs, Codes and Cryptography 34 (2005), 71-87. 7. M. Harada, A. Munemasa and V.D.  ...  Tonchev, A Characterization of Designs Related to an Extremal Doubly-Even Self-Dual Code  ...  Linear perfect codes and a characterization of the classical designs, Designs, Codes and Cryptography 17 (1999), 121-128. 1998 37.  ... 
doi:10.1007/11753728_61 fatcat:xxc734q4ojetfct3fzquowbxwm

An algorithm for optimal comma free codes with isomorphism rejection

Hao Wang, Vladimir D. Tonchev
2009 Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09  
Tonchev, A note on MDS Codes, n-Arcs and Complete Designs, Designs, Codes and Cryptography 29 (2003), 247-250. 58. V.D.  ...  unitals on 28 points, Designs, Codes and Cryptography 13 (1998), 57-61.  ... 
doi:10.1145/1529282.1529502 dblp:conf/sac/WangT09 fatcat:a22hnn2b2bandlxovu2sa3dgxy

The M2DC Project: Modular Microserver DataCentre

Mariano Cecowski, Giovanni Agosta, Ariel Oleksiak, Michal Kierzynka, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, Rene Griessl, Meysam Peykanu, Lennart Tigges (+13 others)
2016 2016 Euromicro Conference on Digital System Design (DSD)  
Since their introduction, FPGAs can be seen in more and more different fields of applications.  ...  This paper provides an overview of the different topics FPGAs have been used for in the last 15 years of research and why they have been chosen over other processing units like e.g. CPUs.  ...  [251] Cryptography / Pro- cessor design symmetric-key and message authentication co-processor 2004 [252] Mathematics Modulo M multiplication-addition 2004 [253] Control engineering Permanent  ... 
doi:10.1109/dsd.2016.76 dblp:conf/dsd/CecowskiAOKBCKP16 fatcat:bu4nbkqaejebjafrotibui6mkq

Privacy Preserving Data Mining [chapter]

D. Aruna Kumari, K. Rajasekhara Rao, M. Suman
2014 Advances in Intelligent Systems and Computing  
Large Volumes of detailed personal data is regularly collected and analyzed by applications using data mining, sharing of these data is beneficial to the application users.  ...  We are using Vector quantization technique based on LBG Design algorithm for preserving privacy with the help of Codebook.  ...  Lindell and Pinkas designed new approach to PPDM using Cryptography but cryptography solution does not provides expected accuracy after mining result.  ... 
doi:10.1007/978-3-319-03095-1_55 fatcat:r7qqss5wkbgv7iusfd5htwmhda

Light Weight Implementation of Stream Ciphers for M-Commerce Applications [article]

Mona Pourghasem, Elham Ghare Sheikhloo, Reza Ebrahimi Atani
2014 arXiv   pre-print
In this paper, four eSTREAM candidates from software profile were taken into account and analyzed and implemented by using J2ME technology.  ...  Then these algorithms were implemented on a variety of mobile phones and are compared with each other in terms of execution time and finally the obtained Results are expressed.  ...  Lightweight cryptography focus is on new design or the adaptive and efficient implementation of the algorithms and existing cryptography protocols.  ... 
arXiv:1404.4791v1 fatcat:wftbxrquzzcwno3pipozw5ufle

Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography

Stjepan Picek, Claude Carlet, Sylvain Guilley, Julian F. Miller, Domagoj Jakobovic
2016 Evolutionary Computation  
The role of Boolean functions is prominent in several areas like cryptography, sequences, and coding theory.  ...  There are still many combinations of design criteria left unexplored and in this matter evolutionary computation can play a distinct role.  ...  In addition, this work was supported in part by the Research Council KU Leuven (C16/15/058) and IOF project EDA-DSE (HB/13/020).  ... 
doi:10.1162/evco_a_00190 pmid:27482749 fatcat:sdnzswapgbesnmr4tzeuieorki

7. Ways of knowledge transfer [chapter]

2018 Real Life Cryptology  
The system is designed to ease communication, but book three of the volume also gives advice on how to conceal the content of a text.  ...  cryptography walked hand in hand. 45 Knew Everything (New York: Routledge, 2004); Joscelyn Godwin, Athanasius Kircher's Theatre of the World: The Life and Work of the Last Man to Search for Universal  ... 
doi:10.1515/9789048536696-010 fatcat:6nnyrillwbejxoyb2hm46lxjqi

Symmetric Cryptography [chapter]

2006 Security in Fixed and Wireless Networks  
They are essential to protect our on-line bank transactions, credit cards, medical and personal information and to support e-commerce and e-government. They come in different flavors.  ...  Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet.  ...  The goal of this project is to provide security and confidence to embedded systems: privacy of the code (obfuscation), integrity and authenticity of the code, security proof of correctness of the code  ... 
doi:10.1002/0470863722.ch3 fatcat:kye7h3pmnbhkjksvyr4tj4nj7e

symmetric cryptography [chapter]

Martin H. Weik
2000 Computer Science and Communications Dictionary  
They are essential to protect our on-line bank transactions, credit cards, medical and personal information and to support e-commerce and e-government. They come in different flavors.  ...  Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet.  ...  The goal of this project is to provide security and confidence to embedded systems: privacy of the code (obfuscation), integrity and authenticity of the code, security proof of correctness of the code  ... 
doi:10.1007/1-4020-0613-6_18768 fatcat:24uzmmq3pbekxhlquwjzglnsve

Secure Wireless Communication Protocol: To Avoid Vulnerabilities in Shared Authentication

Varun Shukla, Atul Chaturvedi, Neelam Srivastava
2017 Communications on Applied Electronics  
Routers are used to connect both similar and dissimilar LANs. Routers are connected to access points. Access point provides wireless connectivity of a wired LAN.  ...  It can be shown that MITM (Man in the middle attack) based on dictionary attack can be launched very easily and the security of entire network goes down.  ...  The design is vulnerable to dictionary attacks and MITM [8][9][10].  ... 
doi:10.5120/cae2017652680 fatcat:ffmahtcvkba4jje4guqgvtb5gu

Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique

Zahir Muhammed Ziad Muhammad, Fatih Ozkaynak
2019 IEEE Access  
INDEX TERMS Chaos, cryptography, cryptanalysis, image encryption, security problem. VOLUME 7, 2019 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  The common point of these two analyzed studies is that both the original and the improved algorithm are designed on the basis of the cryptanalysis has driven design approach.  ...  ACKNOWLEDGMENT The authors would like to thank the Referee for the constructive comments and recommendations which definitely help to improve the readability and quality of the study.  ... 
doi:10.1109/access.2019.2930606 fatcat:swds5p5jlnfabhic52nz2kddvy

The future of security in Wireless Multimedia Sensor Networks

Manel Guerrero-Zapata, Ruken Zilan, José M. Barceló-Ordinas, Kemal Bicakci, Bulent Tavli
2009 Telecommunications Systems  
We believe that this paper will spur new discussions and research ideas among the researchers from both the industry and the academic world.  ...  But, more importantly, it gives a perspective on how we foresee the future of this research area, its main challenges, and its future trends.  ...  In Proceedings of the 7th annual international conference on mobile computing and networking (pp. 189-199). 32. Liu, D., & Ning, P. (2004).  ... 
doi:10.1007/s11235-009-9235-0 fatcat:rcwslfkznvhcdcxe5ngn4upvfy

IMPROVED CAESAR CIPHER WITH RANDOM NUMBER GENERATION TECHNIQUE AND MULTISTAGE ENCRYPTION

S G Srikantaswamy
2019 Zenodo  
Thus the proposed Scheme is a hybrid version of classical and modern cipher properties. The proposed method provides appreciable Security with high throughput and occupies minimum memory space.  ...  The efficiency of the Ciphers that are being used depends mainly on their throughput and memory requirement.  ...  Cryptographic techniques using graceful codes has been proposed ( Prof.K.Govinda and Dr.E.Sathiyamoorth", Multilevel Cryptography Technique using Graceful Codes "-JGRCS, Volume 2, N0.7, July 2011).  ... 
doi:10.5281/zenodo.2605906 fatcat:acmm2g4fkzgyxnso3tzn7od4ty

Efficient NewHope Cryptography Based Facial Security System on a GPU

Phap Duong-Ngoc, Tuy Nguyen Tan, Hanho Lee
2020 IEEE Access  
For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 8, 2020 P. Duong-Ngoc et al.: Efficient NewHope Cryptography-Based Facial Security System on a GPU FIGURE 1.  ...  On the other hand, traditional cryptography systems are still expensive, time consuming, and low security, leading to be threatened by the foreseeable attacks of quantum computers.  ...  His research interests include VLSI algorithms and architecture design for cryptosystems and error correction codes.  ... 
doi:10.1109/access.2020.3000316 fatcat:q65ylsrh25fvbedbdk77fduzy4

State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher

Disha Handa, Bhanu Kapoor
2014 International Journal on Computational Science & Applications  
RC4 has been used as the data encryption algorithm for many applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few.  ...  Several efficient approaches to the implementation of RC4 have been proposed and we review some of those.  ...  For this research java (JDK version:1.6.0_21) is used to write source code.  ... 
doi:10.5121/ijcsa.2014.4403 fatcat:kuq6tievtfhnrixs4ijortu63u
« Previous Showing results 1 — 15 out of 1,882 results