1,714 Hits in 5.2 sec

Optimal Difference Systems of Sets with Multipliers [chapter]

Vladimir D. Tonchev, Hao Wang
2006 Lecture Notes in Computer Science  
Tonchev, Symmetric (4, 4)-nets and generalized Hadamard matrices over groups of order 4, Designs, Codes and Cryptography 34 (2005), 71-87. 7. M. Harada, A. Munemasa and V.D.  ...  Tonchev, Affine designs and linear orthogonal arrays, Discrete Math. 294 (2005) 219-222. 6. M. Harada, C. Lam and V.D.  ...  Linear perfect codes and a characterization of the classical designs, Designs, Codes and Cryptography 17 (1999), 121-128. 1998 37.  ... 
doi:10.1007/11753728_61 fatcat:xxc734q4ojetfct3fzquowbxwm

An algorithm for optimal comma free codes with isomorphism rejection

Hao Wang, Vladimir D. Tonchev
2009 Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09  
Tonchev, Symmetric (4, 4)-nets and generalized Hadamard matrices over groups of order 4, Designs, Codes and Cryptography 34 (2005), 71-87. 51. M. Harada, A. Munemasa and V.D.  ...  Tonchev, Finite geometry designs, codes, and Hamada's conjecture, in: Information Security, Coding Theory and Related Combinatorics, D. Crnković and V. 36. V.D.  ... 
doi:10.1145/1529282.1529502 dblp:conf/sac/WangT09 fatcat:a22hnn2b2bandlxovu2sa3dgxy

Using error-correcting dependencies for collaborative filtering

Galina Bogdanova, Tsvetanka Georgieva
2008 Data & Knowledge Engineering  
Completely reducible super-simple designs with block size four and related super-simple packings (2010) Designs, Codes, and Cryptography, pp. 1-26. Article in Press.  ...  Yin,"Combinatorial Constructions of Optimal Constant- Composition Codes", IEEE Trans. Info. Theory., 51, 2005, 3671-3674. 5. (2006) Designs, Codes, and Cryptography, 40 (2), pp. 157-165 8.  ... 
doi:10.1016/j.datak.2008.04.008 fatcat:xkgdz76effgp3lsjzeftlebspy

The M2DC Project: Modular Microserver DataCentre

Mariano Cecowski, Giovanni Agosta, Ariel Oleksiak, Michal Kierzynka, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, Rene Griessl, Meysam Peykanu, Lennart Tigges (+13 others)
2016 2016 Euromicro Conference on Digital System Design (DSD)  
Since their introduction, FPGAs can be seen in more and more different fields of applications.  ...  This paper provides an overview of the different topics FPGAs have been used for in the last 15 years of research and why they have been chosen over other processing units like e.g. CPUs.  ...  Lattice quantum chromodynamics simulation 2005 [290] Processor design Intermediate code to machine code assembler 2005 [291] Processor design General purpose hidden Markov model (HMM) processor  ... 
doi:10.1109/dsd.2016.76 dblp:conf/dsd/CecowskiAOKBCKP16 fatcat:bu4nbkqaejebjafrotibui6mkq

A decade of Finite Fields and Their Applications

Gary L. Mullen
2005 Finite Fields and Their Applications  
This activity has occurred in a wide variety of areas, including of course finite field theory itself, along with algebraic coding theory, cryptography, combinatorial design theory, and algebraic geometry  ...  Recent combinatorial design theory books include [1, 4, 6, 7, [17] [18] [19] . A number of books dealing with theoretical as well as applied aspects of cryptography have recently been published.  ... 
doi:10.1016/j.ffa.2005.05.009 fatcat:rgii7n2uanc27ohm3tse4tcbhi

Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order

P. Hecht
2017 International Journal of Advanced Engineering Research and Science  
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor's polynomial time algorithm  ...  Such features make them suitable for low performance and low power consumption platforms like smart cards, USB-keys and cellphones.  ...  Ushakov, Non- commutative Cryptography and Complexity of Group-theoretic Problems, Mathematical Surveys and Monographs, AMS Volume 177, 2011 [8] M. I. González Vasco, R.  ... 
doi:10.22161/ijaers.4.6.10 fatcat:xr6w2czxq5b4jkqqzj5hcpmohi

New field of cryptography: DNA cryptography

Guozhen Xiao, Mingxin Lu, Lei Qin, Xuejia Lai
2006 Science Bulletin  
Note that DNA cryptography is not the same as genetic code. Genetic code deals with the heredity of life and belongs to the field of gene biotechnology.  ...  the design of secure and practical DNA cryptosystems is possible.  ... 
doi:10.1007/s11434-006-2012-5 fatcat:wjh73wmrgzdvlmdfruq5ia6kfi

The future of security in Wireless Multimedia Sensor Networks

Manel Guerrero-Zapata, Ruken Zilan, José M. Barceló-Ordinas, Kemal Bicakci, Bulent Tavli
2009 Telecommunications Systems  
We believe that this paper will spur new discussions and research ideas among the researchers from both the industry and the academic world.  ...  But, more importantly, it gives a perspective on how we foresee the future of this research area, its main challenges, and its future trends.  ...  signals in a distributed manner resulting in a coding design with low complexity encoders and high complexity decoders.  ... 
doi:10.1007/s11235-009-9235-0 fatcat:rcwslfkznvhcdcxe5ngn4upvfy

7. Ways of knowledge transfer [chapter]

2018 Real Life Cryptology  
The system is designed to ease communication, but book three of the volume also gives advice on how to conceal the content of a text.  ...  he had designed.  ... 
doi:10.1515/9789048536696-010 fatcat:6nnyrillwbejxoyb2hm46lxjqi

Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique

Zahir Muhammed Ziad Muhammad, Fatih Ozkaynak
2019 IEEE Access  
INDEX TERMS Chaos, cryptography, cryptanalysis, image encryption, security problem. VOLUME 7, 2019 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  The common point of these two analyzed studies is that both the original and the improved algorithm are designed on the basis of the cryptanalysis has driven design approach.  ...  ACKNOWLEDGMENT The authors would like to thank the Referee for the constructive comments and recommendations which definitely help to improve the readability and quality of the study.  ... 
doi:10.1109/access.2019.2930606 fatcat:swds5p5jlnfabhic52nz2kddvy

Symmetric Cryptography (Dagstuhl Seminar 20041)

Nils Gregor Leander, Bart Mennink, Kaisa Nyberg, Kan Yasuda
2020 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 20041 "Symmetric Cryptography".  ...  This was the seventh seminar in the series "Symmetric Cryptography". Previous editions were held in 2007, 2009, 2012, 2014, 2016, and 2018.  ...  Firstly we point out the similarity of DECK function and multi-forkcipher security notions, and propose to study their relation.  ... 
doi:10.4230/dagrep.10.1.130 dblp:journals/dagstuhl-reports/LeanderMNY20 fatcat:7oic7mmj5fht7heg73kyxano2e

The Security Impact of a New Cryptographic Library [chapter]

Daniel J. Bernstein, Tanja Lange, Peter Schwabe
2012 Lecture Notes in Computer Science  
This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by previous cryptographic  ...  In 2005, Osvik, Shamir, and Tromer described a timing attack that discovered the AES key of the dm-crypt hard-disk encryption in Linux in just 65 milliseconds. See [28] and [36] .  ...  A lower volume of network traffic means that the CPU needs only a fraction of its time to handle the cryptography.  ... 
doi:10.1007/978-3-642-33481-8_9 fatcat:xygnrl4xhjeu5mqyreolcthypu

Bibliography [chapter]

2021 Law and Policy for the Quantum Age  
. -(2005). The Born-Einstein Letters 1916-1955: Friendship, Poli-tics and Physics in Uncertain Times. London: Macmillan. Einstein, Albert, Max Born, and Werner Heisenberg (2005).  ...  Pub-lished in Engineering and Science, February 1960, pp. 22-36. -(1982). "Simulating Physics with Computers."  ... 
doi:10.1017/9781108883719.019 fatcat:4xliebrtwbha5odtf6fyshbttm

Optical encryption techniques for data security

Kehar Singh, Giancarlo C. Righini, Anna Consortini
2003 19th Congress of the International Commission for Optics: Optics for the Quality of Life  
This paper provides a comprehensive overview of evolution of encryption algorithms right from ancient cryptography techniques to modern encryption algorithms.  ...  As web services also have data storage and data communication, we need to protect and provide confidentiality. There is a need to recognize the different aspects of security and their applications.  ...  IDEA for high volume video signals such as, ISO standard uses the same features and framework for both encryption 11172 or MPEG-1.  ... 
doi:10.1117/12.524636 fatcat:ya3224a6sjdbfkq2gpmrktrgjq

An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security

Nana Nana, Puguh Wahyu Prasetyo
2021 Bulletin of Applied Mathematics and Mathematics Education  
Therefore, to maintain the confidentiality of any message, cryptography is needed. Cryptography is a science that uses mathematics to encrypt and decrypt messages.  ...  Cryptography is used as a tool to protect messages, for example, national secrets and strategies. The method of this research is qualitative research with a literature review.  ...  Moreover, cryptography is designed as a science that uses mathematics to encrypt and decrypt messages to enhance the security of the messages.  ... 
doi:10.12928/bamme.v1i2.4252 fatcat:re7w3bgh3ve4vpotso6mqfe7ji
« Previous Showing results 1 — 15 out of 1,714 results