A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimal Difference Systems of Sets with Multipliers
[chapter]
2006
Lecture Notes in Computer Science
Tonchev, Symmetric (4, 4)-nets and generalized Hadamard matrices over groups of order 4, Designs, Codes and Cryptography 34 (2005), 71-87. 7. M. Harada, A. Munemasa and V.D. ...
Tonchev, Affine designs and linear orthogonal arrays, Discrete Math. 294 (2005) 219-222. 6. M. Harada, C. Lam and V.D. ...
Linear perfect codes and a characterization of the classical designs, Designs, Codes and Cryptography 17 (1999), 121-128. 1998 37. ...
doi:10.1007/11753728_61
fatcat:xxc734q4ojetfct3fzquowbxwm
An algorithm for optimal comma free codes with isomorphism rejection
2009
Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09
Tonchev, Symmetric (4, 4)-nets and generalized Hadamard matrices over groups of order 4, Designs, Codes and Cryptography 34 (2005), 71-87. 51. M. Harada, A. Munemasa and V.D. ...
Tonchev, Finite geometry designs, codes, and Hamada's conjecture, in: Information Security, Coding Theory and Related Combinatorics, D. Crnković and V. 36. V.D. ...
doi:10.1145/1529282.1529502
dblp:conf/sac/WangT09
fatcat:a22hnn2b2bandlxovu2sa3dgxy
Using error-correcting dependencies for collaborative filtering
2008
Data & Knowledge Engineering
Completely reducible super-simple designs with block size four and related super-simple packings (2010) Designs, Codes, and Cryptography, pp. 1-26. Article in Press. ...
Yin,"Combinatorial Constructions of Optimal Constant-
Composition Codes", IEEE Trans. Info. Theory., 51, 2005, 3671-3674.
5. (2006) Designs, Codes, and Cryptography, 40 (2), pp. 157-165
8. ...
doi:10.1016/j.datak.2008.04.008
fatcat:xkgdz76effgp3lsjzeftlebspy
The M2DC Project: Modular Microserver DataCentre
2016
2016 Euromicro Conference on Digital System Design (DSD)
Since their introduction, FPGAs can be seen in more and more different fields of applications. ...
This paper provides an overview of the different topics FPGAs have been used for in the last 15 years of research and why they have been chosen over other processing units like e.g. CPUs. ...
Lattice quantum chromodynamics simulation
2005
[290]
Processor design
Intermediate code to machine code assembler
2005
[291]
Processor design
General purpose hidden Markov model (HMM) processor ...
doi:10.1109/dsd.2016.76
dblp:conf/dsd/CecowskiAOKBCKP16
fatcat:bu4nbkqaejebjafrotibui6mkq
A decade of Finite Fields and Their Applications
2005
Finite Fields and Their Applications
This activity has occurred in a wide variety of areas, including of course finite field theory itself, along with algebraic coding theory, cryptography, combinatorial design theory, and algebraic geometry ...
Recent combinatorial design theory books include [1, 4, 6, 7, [17] [18] [19] . A number of books dealing with theoretical as well as applied aspects of cryptography have recently been published. ...
doi:10.1016/j.ffa.2005.05.009
fatcat:rgii7n2uanc27ohm3tse4tcbhi
Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order
2017
International Journal of Advanced Engineering Research and Science
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor's polynomial time algorithm ...
Such features make them suitable for low performance and low power consumption platforms like smart cards, USB-keys and cellphones. ...
Ushakov, Non-
commutative Cryptography and Complexity of
Group-theoretic Problems, Mathematical Surveys
and Monographs, AMS Volume 177, 2011
[8] M. I. González Vasco, R. ...
doi:10.22161/ijaers.4.6.10
fatcat:xr6w2czxq5b4jkqqzj5hcpmohi
New field of cryptography: DNA cryptography
2006
Science Bulletin
Note that DNA cryptography is not the same as genetic code. Genetic code deals with the heredity of life and belongs to the field of gene biotechnology. ...
the design of secure and practical DNA cryptosystems is possible. ...
doi:10.1007/s11434-006-2012-5
fatcat:wjh73wmrgzdvlmdfruq5ia6kfi
The future of security in Wireless Multimedia Sensor Networks
2009
Telecommunications Systems
We believe that this paper will spur new discussions and research ideas among the researchers from both the industry and the academic world. ...
But, more importantly, it gives a perspective on how we foresee the future of this research area, its main challenges, and its future trends. ...
signals in a distributed manner resulting in a coding design with low complexity encoders and high complexity decoders. ...
doi:10.1007/s11235-009-9235-0
fatcat:rcwslfkznvhcdcxe5ngn4upvfy
7. Ways of knowledge transfer
[chapter]
2018
Real Life Cryptology
The system is designed to ease communication, but book three of the volume also gives advice on how to conceal the content of a text. ...
he had designed. ...
doi:10.1515/9789048536696-010
fatcat:6nnyrillwbejxoyb2hm46lxjqi
Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique
2019
IEEE Access
INDEX TERMS Chaos, cryptography, cryptanalysis, image encryption, security problem. VOLUME 7, 2019 This work is licensed under a Creative Commons Attribution 4.0 License. ...
The common point of these two analyzed studies is that both the original and the improved algorithm are designed on the basis of the cryptanalysis has driven design approach. ...
ACKNOWLEDGMENT The authors would like to thank the Referee for the constructive comments and recommendations which definitely help to improve the readability and quality of the study. ...
doi:10.1109/access.2019.2930606
fatcat:swds5p5jlnfabhic52nz2kddvy
Symmetric Cryptography (Dagstuhl Seminar 20041)
2020
Dagstuhl Reports
This report documents the program and the outcomes of Dagstuhl Seminar 20041 "Symmetric Cryptography". ...
This was the seventh seminar in the series "Symmetric Cryptography". Previous editions were held in 2007, 2009, 2012, 2014, 2016, and 2018. ...
Firstly we point out the similarity of DECK function and multi-forkcipher security notions, and propose to study their relation. ...
doi:10.4230/dagrep.10.1.130
dblp:journals/dagstuhl-reports/LeanderMNY20
fatcat:7oic7mmj5fht7heg73kyxano2e
The Security Impact of a New Cryptographic Library
[chapter]
2012
Lecture Notes in Computer Science
This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by previous cryptographic ...
In 2005, Osvik, Shamir, and Tromer described a timing attack that discovered the AES key of the dm-crypt hard-disk encryption in Linux in just 65 milliseconds. See [28] and [36] . ...
A lower volume of network traffic means that the CPU needs only a fraction of its time to handle the cryptography. ...
doi:10.1007/978-3-642-33481-8_9
fatcat:xygnrl4xhjeu5mqyreolcthypu
Bibliography
[chapter]
2021
Law and Policy for the Quantum Age
. -(2005). The Born-Einstein Letters 1916-1955: Friendship, Poli-tics and Physics in Uncertain Times. London: Macmillan. Einstein, Albert, Max Born, and Werner Heisenberg (2005). ...
Pub-lished in Engineering and Science, February 1960, pp. 22-36. -(1982). "Simulating Physics with Computers." ...
doi:10.1017/9781108883719.019
fatcat:4xliebrtwbha5odtf6fyshbttm
Optical encryption techniques for data security
2003
19th Congress of the International Commission for Optics: Optics for the Quality of Life
This paper provides a comprehensive overview of evolution of encryption algorithms right from ancient cryptography techniques to modern encryption algorithms. ...
As web services also have data storage and data communication, we need to protect and provide confidentiality. There is a need to recognize the different aspects of security and their applications. ...
IDEA for high volume video signals such as, ISO standard uses the same features and framework for both encryption 11172 or MPEG-1. ...
doi:10.1117/12.524636
fatcat:ya3224a6sjdbfkq2gpmrktrgjq
An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security
2021
Bulletin of Applied Mathematics and Mathematics Education
Therefore, to maintain the confidentiality of any message, cryptography is needed. Cryptography is a science that uses mathematics to encrypt and decrypt messages. ...
Cryptography is used as a tool to protect messages, for example, national secrets and strategies. The method of this research is qualitative research with a literature review. ...
Moreover, cryptography is designed as a science that uses mathematics to
encrypt and decrypt messages to enhance the security of the messages. ...
doi:10.12928/bamme.v1i2.4252
fatcat:re7w3bgh3ve4vpotso6mqfe7ji
« Previous
Showing results 1 — 15 out of 1,714 results