A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimal Difference Systems of Sets with Multipliers
[chapter]
2006
Lecture Notes in Computer Science
Tonchev, Symmetric (4, 4)-nets and generalized Hadamard matrices over groups of order 4, Designs, Codes and Cryptography 34 (2005), 71-87. 7. M. Harada, A. Munemasa and V.D. ...
Tonchev, A Characterization of Designs Related to an Extremal Doubly-Even Self-Dual Code ...
Linear perfect codes and a characterization of the classical designs, Designs, Codes and Cryptography 17 (1999), 121-128. 1998 37. ...
doi:10.1007/11753728_61
fatcat:xxc734q4ojetfct3fzquowbxwm
An algorithm for optimal comma free codes with isomorphism rejection
2009
Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09
Tonchev, A note on MDS Codes, n-Arcs and Complete Designs, Designs, Codes and Cryptography 29 (2003), 247-250. 58. V.D. ...
unitals on 28 points, Designs, Codes and Cryptography 13 (1998), 57-61. ...
doi:10.1145/1529282.1529502
dblp:conf/sac/WangT09
fatcat:a22hnn2b2bandlxovu2sa3dgxy
The M2DC Project: Modular Microserver DataCentre
2016
2016 Euromicro Conference on Digital System Design (DSD)
Since their introduction, FPGAs can be seen in more and more different fields of applications. ...
This paper provides an overview of the different topics FPGAs have been used for in the last 15 years of research and why they have been chosen over other processing units like e.g. CPUs. ...
[251]
Cryptography / Pro-
cessor design
symmetric-key and message authentication co-processor
2004
[252]
Mathematics
Modulo M multiplication-addition
2004
[253]
Control engineering
Permanent ...
doi:10.1109/dsd.2016.76
dblp:conf/dsd/CecowskiAOKBCKP16
fatcat:bu4nbkqaejebjafrotibui6mkq
Privacy Preserving Data Mining
[chapter]
2014
Advances in Intelligent Systems and Computing
Large Volumes of detailed personal data is regularly collected and analyzed by applications using data mining, sharing of these data is beneficial to the application users. ...
We are using Vector quantization technique based on LBG Design algorithm for preserving privacy with the help of Codebook. ...
Lindell and Pinkas designed new approach to PPDM using Cryptography but cryptography solution does not provides expected accuracy after mining result. ...
doi:10.1007/978-3-319-03095-1_55
fatcat:r7qqss5wkbgv7iusfd5htwmhda
Light Weight Implementation of Stream Ciphers for M-Commerce Applications
[article]
2014
arXiv
pre-print
In this paper, four eSTREAM candidates from software profile were taken into account and analyzed and implemented by using J2ME technology. ...
Then these algorithms were implemented on a variety of mobile phones and are compared with each other in terms of execution time and finally the obtained Results are expressed. ...
Lightweight cryptography focus is on new design or the adaptive and efficient implementation of the algorithms and existing cryptography protocols. ...
arXiv:1404.4791v1
fatcat:wftbxrquzzcwno3pipozw5ufle
Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography
2016
Evolutionary Computation
The role of Boolean functions is prominent in several areas like cryptography, sequences, and coding theory. ...
There are still many combinations of design criteria left unexplored and in this matter evolutionary computation can play a distinct role. ...
In addition, this work was supported in part by the Research Council KU Leuven (C16/15/058) and IOF project EDA-DSE (HB/13/020). ...
doi:10.1162/evco_a_00190
pmid:27482749
fatcat:sdnzswapgbesnmr4tzeuieorki
7. Ways of knowledge transfer
[chapter]
2018
Real Life Cryptology
The system is designed to ease communication, but book three of the volume also gives advice on how to conceal the content of a text. ...
cryptography walked hand in hand. 45 Knew Everything (New York: Routledge, 2004); Joscelyn Godwin, Athanasius Kircher's Theatre of the World: The Life and Work of the Last Man to Search for Universal ...
doi:10.1515/9789048536696-010
fatcat:6nnyrillwbejxoyb2hm46lxjqi
Symmetric Cryptography
[chapter]
2006
Security in Fixed and Wireless Networks
They are essential to protect our on-line bank transactions, credit cards, medical and personal information and to support e-commerce and e-government. They come in different flavors. ...
Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet. ...
The goal of this project is to provide security and confidence to embedded systems: privacy of the code (obfuscation), integrity and authenticity of the code, security proof of correctness of the code ...
doi:10.1002/0470863722.ch3
fatcat:kye7h3pmnbhkjksvyr4tj4nj7e
symmetric cryptography
[chapter]
2000
Computer Science and Communications Dictionary
They are essential to protect our on-line bank transactions, credit cards, medical and personal information and to support e-commerce and e-government. They come in different flavors. ...
Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet. ...
The goal of this project is to provide security and confidence to embedded systems: privacy of the code (obfuscation), integrity and authenticity of the code, security proof of correctness of the code ...
doi:10.1007/1-4020-0613-6_18768
fatcat:24uzmmq3pbekxhlquwjzglnsve
Secure Wireless Communication Protocol: To Avoid Vulnerabilities in Shared Authentication
2017
Communications on Applied Electronics
Routers are used to connect both similar and dissimilar LANs. Routers are connected to access points. Access point provides wireless connectivity of a wired LAN. ...
It can be shown that MITM (Man in the middle attack) based on dictionary attack can be launched very easily and the security of entire network goes down. ...
The design is vulnerable to dictionary attacks and MITM [8][9][10]. ...
doi:10.5120/cae2017652680
fatcat:ffmahtcvkba4jje4guqgvtb5gu
Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique
2019
IEEE Access
INDEX TERMS Chaos, cryptography, cryptanalysis, image encryption, security problem. VOLUME 7, 2019 This work is licensed under a Creative Commons Attribution 4.0 License. ...
The common point of these two analyzed studies is that both the original and the improved algorithm are designed on the basis of the cryptanalysis has driven design approach. ...
ACKNOWLEDGMENT The authors would like to thank the Referee for the constructive comments and recommendations which definitely help to improve the readability and quality of the study. ...
doi:10.1109/access.2019.2930606
fatcat:swds5p5jlnfabhic52nz2kddvy
The future of security in Wireless Multimedia Sensor Networks
2009
Telecommunications Systems
We believe that this paper will spur new discussions and research ideas among the researchers from both the industry and the academic world. ...
But, more importantly, it gives a perspective on how we foresee the future of this research area, its main challenges, and its future trends. ...
In Proceedings of the 7th annual international conference on mobile computing and networking (pp. 189-199). 32. Liu, D., & Ning, P. (2004). ...
doi:10.1007/s11235-009-9235-0
fatcat:rcwslfkznvhcdcxe5ngn4upvfy
IMPROVED CAESAR CIPHER WITH RANDOM NUMBER GENERATION TECHNIQUE AND MULTISTAGE ENCRYPTION
2019
Zenodo
Thus the proposed Scheme is a hybrid version of classical and modern cipher properties. The proposed method provides appreciable Security with high throughput and occupies minimum memory space. ...
The efficiency of the Ciphers that are being used depends mainly on their throughput and memory requirement. ...
Cryptographic techniques using graceful codes has been proposed ( Prof.K.Govinda and Dr.E.Sathiyamoorth", Multilevel Cryptography Technique using Graceful Codes "-JGRCS, Volume 2, N0.7, July 2011). ...
doi:10.5281/zenodo.2605906
fatcat:acmm2g4fkzgyxnso3tzn7od4ty
Efficient NewHope Cryptography Based Facial Security System on a GPU
2020
IEEE Access
For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 8, 2020 P. Duong-Ngoc et al.: Efficient NewHope Cryptography-Based Facial Security System on a GPU FIGURE 1. ...
On the other hand, traditional cryptography systems are still expensive, time consuming, and low security, leading to be threatened by the foreseeable attacks of quantum computers. ...
His research interests include VLSI algorithms and architecture design for cryptosystems and error correction codes. ...
doi:10.1109/access.2020.3000316
fatcat:q65ylsrh25fvbedbdk77fduzy4
State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher
2014
International Journal on Computational Science & Applications
RC4 has been used as the data encryption algorithm for many applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. ...
Several efficient approaches to the implementation of RC4 have been proposed and we review some of those. ...
For this research java (JDK version:1.6.0_21) is used to write source code. ...
doi:10.5121/ijcsa.2014.4403
fatcat:kuq6tievtfhnrixs4ijortu63u
« Previous
Showing results 1 — 15 out of 1,882 results