A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
One may view this result as a general cryptanalytic t,ool: to show that a cryptosysteni can be broken in subexponential time it suffices to show that it is algebraically homomorphic. ... They show that for the group G = Z/pZ the best, algorithm for finding a hidden element must t,ake time R( m). Sub-exponential algorithrns for BBFP have several consequences t o cryptography. ... Acknowledgments The authors wish to thank IJeli Maurer and Stefan Wolf for hclpful comments on this manuscript. ...doi:10.1007/3-540-68697-5_22 fatcat:b3bhtsan7bay3m4ks5yssarbsi
Addenda: “An inequality of M. Radulescu and S. ... nonlinear problems with applications in engineering, economics and physics * 65046 Introduction to the geometry and topology of fluid flows * 00017 IUTAM Symposium: Computational Mechanics of Solid Materials ...
McNie is a hybrid version of the McEliece and Niederreiter cryptosystems and its security is reduced to the hard problem of syndrome decoding. ... The public key involves a random generator matrix which is also used to mask the code used in the secret key. This makes the system safer against known structural attacks. ... Sendrier, N.: On the concatenated structure of a linear code. Applicable Algebra in Engineering, Communication and Computing 9(3), pp. 221–242 (1998) 40. ...arXiv:1812.05008v2 fatcat:wsagwr4tofd3fdn2cxpp3vogte
Lecture Notes in Computer Science
The algebraic properties of the protocol are modeled by an equational theory implemented as a convergent rewriting system which involves rules for addition, multiplication and exponentiation. ... It is proved that the associative-commutative (AC) equality of the algebraic theory can be decided in polynomial time, provided a strategy to avoid distributivity law between the AC operators is adopted ... If M and N are quasi-EP terms F EP (M ) * → R EP F EP (N ), then M * → R EP N . Proof (Sketch). The proof follows by induction on the structure of M . ...doi:10.1007/978-3-642-13824-9_18 fatcat:hnkrxv6ckbe2tdbncinns3ecya
Conflicts of interest The authors have no conflicts of interest to declare. ... To explore the applicability of hybridization of cryptography and steganography. 4. To analyses the impact and influence of different methods applied. ... Encryption and decryption procedure can be applied based on the nature of key applicability. It can be categorized as public key cryptography and private key cryptography  . ...doi:10.19101/ijacr.2020.10480104 fatcat:4gray5ozz5fefarsw3hwczwsci
DES and AES are equivalent to non linear cellular automata rules providing the confusion property of cryptography. ... In this paper we present the equivalence of the operations involved in DES and AES algorithm with operations of cellular automata. ... All these works were based on Boolean functions and its applications in cellular automata in cryptography in stream cipher. ...doi:10.47893/ijcns.2011.1008 fatcat:2l7jd3mgwvf4pjnfclo7kdfeeq
Goldreich, Modern cryptography, probabilistic proofs and pseudorandomness, Springer, Berlin, 1999; MR 2000f:94029] survey some applications to data structures, algorithm design, cryptography and complexity ... A beautiful theory has emerged to prove such results, and a number of important ap- plications have arisen, most notably to cryptography and to the theory of approximation algorithms. ...
Science World Journal
CONCLUSION The climax of the work is the design and implementation of data security over a network through the use of elliptic curve cryptography, which is a very strong tool that can be implored to achieve ... the human eye, this is because data is encrypted only while in transit, existing as plaintext on the originating and receiving hosts. ... Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ...doi:10.4314/swj.v3i4.51822 fatcat:vdavqd3gzzhphanl7oqy3wkngm
Elliptic curve cryptography (ECC)  is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ... The proposed technique of secure data aggregation is used to improve the sensor network lifetime and to reduce the energy consumption during aggregation process. ... Two cipher texts will be generated let it be C1 and C2. C1 = k*P C2 = M + k*Q C1 and C2 will be send. Decryption We have to get back the message "m" that was send to us, VI. ...doi:10.23956/ijarcsse/v7i7/0162 fatcat:ggbcikgtrvb57agmbhnj5w6chu
Lecture Notes in Computer Science
Two algorithmic techniques for specifying the existence of a k × k submatrix with elements 0, ±1 in a skew and symmetric conference matrix of order n are described. ... This specification is achieved using an appropriate computer algebra system. ... In Step 4 is formulated a Distribution type Lemma, which gives the number of several columns appearing in a weighing matrix and will allow us to obtain bounds on the column structure of a weighing matrix ...doi:10.1007/11555964_25 fatcat:jhifa3a6kzddzgouyworq3uxua
cryptography and information hiding technology, and design secure and efficient reversible information hiding methods. ... Through excavation and effective use of redundancy in the encryption process, we compromise the information hiding technology and encryption technology, construct the theoretical model of the fusion of ... Though the stream cipher encrypts the image into unreadable encrypted data, it will destroy the algebraic structure of the encrypted data. ...doi:10.1109/access.2020.2990903 fatcat:a4wjqg3obffelhskh3ubmuvl5i
The proposed scheme uses an equivalent subcode as a public code for the receiver, making the NP-completeness of the equivalent subcode problem be one of our main security assumptions. ... We give security analyses of both our schemes in the standard model and prove that they are secure against IND-CCA2 (indistinguishability under adaptive chosen ciphertext attack) and SUF-CMA (strong existential ... Couvreur, “An efficient structural attack on nist submission dags,” in International Conference on the Theory and Application of Cryptology and Information Security. ...arXiv:2112.07130v1 fatcat:mxx3zwiax5hgticy4llun2pepa
Many researchers have tried to exploit the features of ECC field for security applications. ... This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve cryptography and DNA computing. ... defined over finite fields on the basis of algebraic structures of the elliptic curves  . ...doi:10.32628/ijsrset207264 fatcat:vm37rwlabjejjgaszfoutddwai
This formula is highly structured and far simpler than algebraic formulations of any other block cipher we know. ... Both proposed schemes use O(k) bits to commit to one bit and can be based on the existence of trapdoor commitments and non-malleable encryption. ...
Lecture Notes in Electrical Engineering
Rivest Cipher 4 (RC4) is one of the modern encryption techniques utilized in many real time security applications; however, it has several weaknesses including a correlation problem in the initially generated ... Moreover, RRC4's high resistivity protects against many attacks vulnerable to RC4 and solves several weaknesses of RC4 such as predictable first bytes of intermediate outputs by RC4. ... Acknowledgments This work is based in part, upon research supported by the National Science Foundation (under Grant Nos. CNS-0855248 and EPS-0918970). Any opinions, findings and ...doi:10.1007/978-94-007-6996-0_42 fatcat:uehxe4s3svfrhkc22g377kigou
« Previous Showing results 1 — 15 out of 525 results