A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme
[chapter]
2017
Lecture Notes in Computer Science
This disparity is especially great for the cubic version of the Simple Matrix Encryption Scheme. ...
This work therefore demonstrates that choosing a field of characteristic 2 for the Simple Matrix Encryption Scheme or its cubic variant will not provide any additional security value. ...
In the next section, we present the structure of the Cubic ABC Simple Matrix encryption scheme. ...
doi:10.1007/978-3-319-59879-6_15
fatcat:m2sdxehkuvbxfav2xae3ii4uzy
Circulant UOV: a new UOV variant with shorter private key and faster signature generation
2018
KSII Transactions on Internet and Information Systems
We estimate that the private key size of Circulant UOV is smaller by about 45% than that of the regular UOV and its signing speed is more than 14 times faster than that of the regular UOV. ...
UOV is one of the most important signature schemes in Multivariate Public Key Cryptography (MPKC). It has a strong security guarantee and is considered to be quantum-resistant. ...
A lot of MPKC encryption and signature schemes have been proposed, e.g., TTS [6] , MQQ [7] , ABC [8] , HFE [9] , ZHFE [10] , EFC [50] etc. ...
doi:10.3837/tiis.2018.03.022
fatcat:2cxslubqb5c6jhtthhvae4jv4e
New First-Order Secure AES Performance Records
2021
Transactions on Cryptographic Hardware and Embedded Systems
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptographic implementations against Side-Channel Analysis (SCA) attacks. ...
gap by introducing first-order glitch-extended probing secure masked AES implementations highly optimized for FPGAs, which support both encryption and decryption. ...
390781972 and through the project 406956718 SuCCESS. ...
doi:10.46586/tches.v2021.i2.304-327
fatcat:r2st3yhkbjga7ar347ahr4jsm4
Data Service Outsourcing and Privacy Protection in Mobile Internet
[chapter]
2018
Data Service Outsourcing and Privacy Protection in Mobile Internet
Preface The data of mobile Internet have the characteristics of large scale, variety of patterns, complex association and so on. ...
control through effective user privacy protection mechanism, and the data sharing in the mobile Internet, which provide technical support for improving various service applications based on mobile Internet ...
The only reason for describing the basic scheme is to improve the readability of the full scheme. ...
doi:10.5772/intechopen.79903
fatcat:kvdisoudirgdhd7tvscnhsb6gm
The Past, Evolving Present, and Future of the Discrete Logarithm
[chapter]
2014
Open Problems in Mathematics and Computational Science
In particular, this is the case for the multiplicative groups of finite fields with medium to large characteristic and for the additive group of a general elliptic curve. ...
This intractability hypothesis is also the foundation for the security of a large variety of other public key systems and protocols. ...
The next two important applications were the identitybased encryption scheme of Boneh and Franklin [BF03] and the short signature scheme of Boneh, Lynn and Shacham [BLS04] . ...
doi:10.1007/978-3-319-10683-0_2
fatcat:ykp3rhh2lnhn5ml4otrrfszoii
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities
2018
Journal of Internet Services and Applications
Primarily, this is due to the explosion in the availability of data, significant improvements in ML techniques, and advancement in computing capabilities. ...
Therefore, this is a timely contribution of the implications of ML for networking, that is pushing the barriers of autonomic network operation and management. ...
Acknowledgments We thank the anonymous reviewers for their insightful comments and suggestions that helped us improve the quality of the paper. ...
doi:10.1186/s13174-018-0087-2
fatcat:jvwpewceevev3n4keoswqlcacu
An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers
2014
Journal of Networks
Telecommunication networks need to support a wide range of services and functionalities with capability of autonomy, scalability and adaptability for managing applications to meet business needs. ...
Moreover, this paper discussed the processing of packets forwarding within DAIM model as well as the risk scenarios of the DAIM model. ...
Based on R-RAPSE, we verify and improve E. J. Yoon's scheme [2] , J. S. Cho's scheme [3] and S. I. Ahamed's scheme [5] . ...
doi:10.4304/jnw.9.01.10-17
fatcat:tbmafdamk5am7a6ba26gsxzydq
The Autodidactic Universe
[article]
2021
arXiv
pre-print
This correspondence is not an equivalence, partly because gauge theories emerge from N →∞ limits of the matrix models, whereas the same limits of the neural networks used here are not well-defined. ...
We propose that if the neural network model can be said to learn without supervision, the same can be said for the corresponding physical theory. ...
The action is then S = T rM 3 = abc T r r A a A b A c , (92) and the equations of motion are [A a , A b ] = 0 , (93) We specify a solution to a cubic matrix model by the following parameters • Pick a gauge ...
arXiv:2104.03902v2
fatcat:zlq7swbxa5b6xhoruxai6xr5du
A Cooperative Network Framework for Multi-UAV Guided Ground Ad Hoc Networks
2014
Journal of Intelligent and Robotic Systems
schemes Additive in-
crease and Binary search increase
Cubic
[Ha et al. 2008] [121]
Long distance networks
Enhances fairness property of BIC with
Cubic window growth function
Hybla
[Caini and ...
with Attackers Parameter
Variation For 2% Attackers
Variation For 5% Attackers
Cognitive Delivery Rate during Intrusion
21.23%
21.6%
Situational Classification Time
42.93%
37.57%
Network Trigger ...
Section 9.3 brings out the certain limitations of the work done. Finally, Section 9.4 presents the scope of future work for possible extension of the present work. ...
doi:10.1007/s10846-014-0091-0
fatcat:uvcsvijwa5egxl5bwh4adsxugu
The Complexity of Quantum States and Transformations: From Quantum Money to Black Holes
[article]
2016
arXiv
pre-print
Those topics include the power of quantum proofs and advice states; how to construct quantum money schemes secure against counterfeiting; and the role of complexity in the black-hole information paradox ...
topics of recent interest in the field. ...
While we explained these attacks for Wiesner's scheme, the same attacks work with only minor modifications for the BBBW scheme-or indeed, for any scheme where the banknotes consist of unentangled qubits ...
arXiv:1607.05256v1
fatcat:mnpmspgwlrdk5pm3fcsthl3lui
A Special issue on Multidisciplinary research to promote the applications in Biological sciences
2022
International Journal of Life Science and Pharma Research
The articles in this issue are led by editors who are experts in the subject and oversee the editorial process for papers. ...
This provides a platform for the researchers to publish their innovative research findings. ...
Acknowledgement The authors express their gratitude towards the host institution and Biozone, Chennai. ...
doi:10.22376/ijpbs/ijlpr/sp22/2022.1-154
fatcat:rcydgammlzgodof3kw3fcdgpji
Intelligent Computing Research Studies in Life Science
2019
International Journal of Pharma and Bio Sciences
Qinlong etal presented a paper that uses broadcast encryption technique that are identity based, the encrypted health data of patients are outsourced on the cloud and are shared among the group of doctors ...
Preventing various attacks are presented in the first scenario and the second scenario presents the analysis of communication and computational complexity of Easy SMS protocol [6]. ...
In the convolution matrix the RGB value of the each image value can be stored in the matrix format.
Fig5. Discrete convolution matrix
D.2 SVM classifier Support Vector Machine. ...
doi:10.22376/ijpbs/10.sp01/oct/2019.1-142
fatcat:6fc5ghwmjbgrphetiablavajxm
An episodic history of mathematics: mathematical culture through problem solving
2010
ChoiceReviews
If the encryption scheme is P → Q ≡ aP + b, then the decryption scheme must be the inverse function. In other words, we solve for P in terms of Q. ...
The ciphertext AUACCEE results from applying the encryption scheme P −→ 3P 2 − P + 2 to a certain 7-letter text. The trouble with this encryption scheme is that it is not one-to-one. ...
The result is LTFBFD . Thus the encryption of "GO AWAY" is "LTFBFD". Notice that we have no coding for a blank space, so we ignore it. This is a very simple example of a cryptosystem. ...
doi:10.5860/choice.48-1529
fatcat:r52umdi4vja6bfxb7kmudrn4ui
Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2016 Budget Estimates
2015
Zenodo
The Defense Advanced Research Projects Agency (DARPA) FY2016 amounted to $2.868 billion in the President's request to support high-risk, high-reward research. ...
for the encryption of messages in the 1970's. ...
-Identify optimal stimulation parameters for improving spatial memory. ...
doi:10.5281/zenodo.1215366
fatcat:cqn5tyfixjanzp5x3tgfkpedri
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2017
International Journal of Network Security
unpublished
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. ...
Currently , the issues of privacy and security have become increasingly important for the mobile users. Traditionally, the security scheme is applied to the higher network layer. ...
This work is supported by the National Natural Science
Acknowledgements The authors would like to thank the authorities of Bharathiar University, Coimbatore, India for providing the necessary laboratory ...
fatcat:vy4pp4thsfcrpakpwdjmdgjuoy
« Previous
Showing results 1 — 15 out of 58 results