29,457 Hits in 4.0 sec

Fixed-parameter complexity and cryptography [chapter]

Michael R. Fellows, Neal Koblitz
1993 Lecture Notes in Computer Science  
We show that several parameterized problems of relevance to cryptography, including k-Subset Sum, k-Perfect Code, and k-Subset Product are likely to be intractable with respect to xed-parameter complexity  ...  We discuss the issue of the parameterized computational complexity of a number of problems of interest in cryptography.  ...  Introduction In this paper we introduce and study the parameterized computational complexity of a number of problems relevant to cryptography.  ... 
doi:10.1007/3-540-56686-4_38 fatcat:ijpu4o44l5bcjgwjnd65axq44a

Modeling Complexity in Secure Distributed Computing [chapter]

Christian Cachin
2003 Lecture Notes in Computer Science  
Acknowledgments This paper is based on joint work with Victor Shoup and Klaus Kursawe.  ...  For a particular protocol, a protocol statistic X is a family of real-valued, nonnegative random variables X A (k), parameterized by adversary A and security parameter k, where each X A (k) is a random  ...  Modern cryptography takes this into account by introducing a security parameter k and formalizing the asymptotic behavior of a primitive in dependence of k.  ... 
doi:10.1007/3-540-37795-6_11 fatcat:bmdwawomqbdrznbmqkblupiruu

Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication

Juan Wang, Qun Ding
2016 Journal of Information Hiding and Multimedia Signal Processing  
Consequently, when the third-level disturbed chaotic sequence is introduced into the cryptography algorithm and the spread spectrum communication, improved performance may be achieved.  ...  In this paper, a new logistic chaos was obtained by improving the traditional logistic chaos, and the second-level and the third-level chaoses were constructed in view of the ideas of cascade and disturbance  ...  This work is supported by the National Natural Science Foundation of China (no. 61471158) and doctor fund item of ministry of education (no. 2013230111 0004).  ... 
dblp:journals/jihmsp/WangD16 fatcat:uooy7jgksbhnbpjjsrfkwbv6em

A Study on Visual Cryptography for Colour Images

R. Shanmuga Priya, A. Senthilkumar
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Visual cryptography process depends on various measures such as accuracy, computational complexity, pixel expansion, contrast whether generated it is meaningless or meaningful.  ...  As the name implies visual cryptography which has a single secret image and more than one shadow images and provided for numerous users.  ...  And this scheme doesn't require any index table but the shares size is fixed. It is not enough for true colour secret picture because pixel expansion fixed.  ... 
doi:10.23956/ijarcsse/v7i7/0172 fatcat:l3ja4uq7tbfyfc26tpsda2xve4

Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography

Kunal Abhishek, E. George Dharma Prakash Raj
2021 Cybernetics and Information Technologies  
Further, two popular deterministic and random approaches for selection of Short Weierstrass elliptic curve for cryptography are evaluated from computational, security and trust perspectives and a trend  ...  The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography.  ...  V. and Dr. Reshmi T. R. for their valuable suggestions.  ... 
doi:10.2478/cait-2021-0045 fatcat:nao3eqm4pfbbzbk55b3gwqrmzu

WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography [article]

Markku-Juhani O. Saarinen
2022 IACR Cryptology ePrint Archive  
"fixed key" tests are unsatisfactory due to the close linkage between public and private components of PQC keypairs.  ...  The scope of FIPS 140-3 will also expand to the new NIST Post-Quantum Cryptography (PQC) standards when migration from older RSA and Elliptic Curve cryptography begins.  ...  A practically relevant testing procedure is able to perform private key operations with the same ρ public values but varying (s 1 , s 2 ) parameters; and compare those traces against fixed (s 1 , s 2 )  ... 
dblp:journals/iacr/Saarinen22a fatcat:uj7cbdpjlndx5fvd2xxsbuxawy

Secure Data Transmission using Cryptography Techniques in Wireless Sensor Networks: A Survey

Heena Dogra, Jyoti Kohli
2016 Indian Journal of Science and Technology  
Finding: For the solution of efficient and reliable security needs cryptography algorithms provides good solutions.  ...  Method: The ongoing developments of the wireless sensor networks and its applications demands for the efficient and secure communication.  ...  . • Availability: In WSNs certain services are needed on demand and certain are fixed like node connectivity is sometimes fixed service or is on demand service to provide such services and demands needs  ... 
doi:10.17485/ijst/2015/v8i1/106883 fatcat:7fqcjplssngptlhmy5ttdhobfm

Comparative Study of Various Substitution and Transposition Encryption Techniques

Preeti Poonia, Praveen Kantha
2016 International Journal of Computer Applications  
In this paper we proposed a comparative study over symmetric key based algorithm using some parameter like algorithm strength, key size, key type attack type etc.  ...  With the rapid development in the technology, Encryption is one the most power full approach to achieve data security and privacy.  ...  Table I The plaintext is written out in rows of a fixed length, and then read out again column by column, and the columns are chosen in some scrambled order.  ... 
doi:10.5120/ijca2016910783 fatcat:ytvor2h3kfebbdq7ufad63o7be

Multiple CLMMs Keys to Secure Message Transmission

Ziad Alqadi, Qazem Jaber
2022 International journal of computer science and mobile computing  
A simple, flexible and efficient method of message cryptography will be introduced. The method will suit any message with any length, it can use one or more rounds to apply encryption-decryption.  ...  The PK will contain information about chaotic parameters, these parameters will be used to run a CLMMs to generate the needed number of CLKs, the generated CLKs will be converted to induces keys, which  ...  The generated CLK will remain fixed when fixing the chaotic parameters values, and the generated CLK are differ from the random generated keys, the random keys must be saved because they will be change  ... 
doi:10.47760/ijcsmc.2022.v11i07.003 fatcat:mbp3ai2gsbdjzp6u4kdikwcpje

A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography

Mua'ad Abu-Faraj, Abeer Al-Hyari, Ziad Alqadi
2022 Symmetry  
The proposed method is appropriate for publication in Symmetry because it employs a symmetrical complex matrix key to encrypt and decrypt digital images.  ...  In this research paper, a new method of digital image cryptography is introduced.  ...  Method Parameter DES 3DES AES Blowfish PK length(bit) 56 (fixed) 112, 168 (fixed) 128, 192, 256 (fixed) 32-448 (fixed) Block size(bit) 64 (fixed) 64 (fixed) 128 (fixed) 64 (fixed) Ability to deal with  ... 
doi:10.3390/sym14040664 fatcat:s2rgfcpbongw5je37x34pztahq

Page 2659 of Mathematical Reviews Vol. , Issue 83f [page]

1983 Mathematical Reviews  
Author’s summary: “Let C be a binary code containing the zero word, with fundamental parameters d, s, d’, and s’, and let ¢ be a nonnegative integer such that the words of any fixed weight of C form a  ...  ISBN 0-471-08132-9 This book has two parts: Foundations of cryptography and Applications of cryptography.  ... 

A Basic Framework for the Cryptanalysis of Digital Chaos-Based Cryptography [article]

David Arroyo and Gonzalo Alvarez and Veronica Fernandez
2008 arXiv   pre-print
However, the right and efficient use of chaos in the context of cryptography requires a thorough knowledge about the dynamics of the selected chaotic system.  ...  Chaotic cryptography is based on the properties of chaos as source of entropy.  ...  Figure 4 . 4 First level of detail of the MultiResolution Entropy of Tsallis of the Hénon map with fixed and variable control parameters.  ... 
arXiv:0811.1859v1 fatcat:64nqo6ar5zh7xhhn4hoqufwu3q

Analysis of Security Gaps in 5G Communication using LDPC Codes and NOMA

Vijey Thayananthan
2019 International Journal of Computer Applications  
Especially, the physical layer is investigated with H and two different high-rate codes and simulated to find the optimum size of security gaps for better security.  ...  Advance communication systems such as fifth generation (5G) and 5G+ expect to deploy the security solutions for securing the communication networks.  ...  The author, therefore, acknowledge with thanks, DSR technical and financial support.  ... 
doi:10.5120/ijca2019918735 fatcat:wtwzyvwdpbfxplqolmw4azapiy

DES Based Method to Improve Color Image Cryptography

Akram Naser Adam Mousa, Talal Bukewitin, Tarek R. S. Al Aga
2022 International journal of computer science and mobile computing  
In this research paper a novel method of color image cryptography will be introduced, tested and implemented.  ...  The process of cryptography can be accomplished using a selected number of rounds, the number of rounds is also determined by the user, more number of rounds are needed to optimize the values of MSE and  ...  The level of security and protection for the data provided by the method of data cryptography depends on the length and complexity of the private key and the complexity of the operations used in the method  ... 
doi:10.47760/ijcsmc.2022.v11i06.014 fatcat:jagjqlgvjncnzpiedmnxgst5fu

A Secured System for Information Hiding in Image Steganography using Genetic Algorithm and Cryptography

Pratiksha Sethi, V. Kapoor
2016 International Journal of Computer Applications  
The implementation of the anticipated technique is performed using JAVA technology and for performance evaluation the time and space complexity is computed.  ...  According to the computed performance the proposed technique is adoptable for hiding information in image securely additionally that consumes less space complexity.  ...  Objective function is used when someone uses Genetic Algorithm to optimize the parameters of system or in complex search process.  ... 
doi:10.5120/ijca2016910425 fatcat:zzrc73lkqfeilgnyspndsx6ihy
« Previous Showing results 1 — 15 out of 29,457 results