Filters








4,536 Hits in 4.5 sec

Alan M. Turing: The Applications of Probability to Cryptography [article]

Ian Taylor
2015 arXiv   pre-print
This is a typeset version of Alan Turing's Second World War research paper The Applications of Probability to Cryptography.  ...  A companion paper Paper on Statistics of Repetitions is also available in typeset form from arXiv at arXiv:1505.04715. The original papers give a text along with figures and tables.  ...  We take a number of plain language messages and leave out two or three words at the beginning.  ... 
arXiv:1505.04714v2 fatcat:agctpxyxvvcotedquocek4fd6u

The complexity of Grigorchuk groups with application to cryptography

Max Garzon, Yechezkel Zalcstein
1991 Theoretical Computer Science  
Garzon, M. and Y. Zalcstein, The complexity of Grigorchuk groups with applications to cryptography, Theoretical Computer Science 88 (1991) 83-98.  ...  New families of nonfinitely presented groups are shown to have word problems uniformly solvable in simultaneous logspace and quadratic time.  ...  Acknowledgment The authors are indebted to both W.I. Gasarch (1) for pointing out the argument for the existence of complete sets, in the proof of Corollary 3.8 and (2) for a careful  ... 
doi:10.1016/0304-3975(91)90074-c fatcat:5devlml6dfao3bu2j7c2qredu4

Gaussian elimination in unitary groups with an application to cryptography [article]

Ayan Mahalanobis, Anupam Singh
2015 arXiv   pre-print
Gaussian elimination is used in special linear groups to solve the word problem. In this paper, we extend Gaussian elimination to unitary groups.  ...  These algorithms have an application in building a public-key cryptosystem, we demonstrate that.  ...  So in the language of computational group theory the word problem in GL(d, K) has an efficient algorithm -Gaussian elimination.  ... 
arXiv:1409.6136v2 fatcat:o4lxd6oghjezvbjmnol7twebry

A one-way function from thermodynamics and applications to cryptography

Norbert Hungerbühler, Michael Struwe
2003 Elemente der Mathematik  
And we thank Carlo Matteotti, Ueli Maurer, Daniel Neuenschwander and François Weissbaum for their expertise, inspiring discussions, and for sharing ideas.  ...  Applications In cryptography the above function Ꮽ might be applied in various ways.  ...  This may be workable on a limited number of occasions, but becomes virtually impracticable for large-scale application of cryptography like in e-banking or for use in the army.  ... 
doi:10.1007/s000170300008 fatcat:ic4qqdycgzcizokq36xqvpa2ui

Gaussian elimination in split unitary groups with an application to public-key cryptography

Ayan Mahalanobis, Anupam Singh
2017 Journal of Algebra Combinatorics Discrete Structures and Applications  
Gaussian elimination is used in special linear groups to solve the word problem. In this paper, we extend Gaussian elimination to split unitary groups.  ...  These algorithms have an application in building a public-key cryptosystem, we demonstrate that. 2010 MSC: 20H30, 94A60  ...  Acknowledgment: Authors owe a debt of gratitude to the referee and the handling editor for careful reading and wonderful comments which has improved the paper substantially.  ... 
doi:10.13069/jacodesmath.327373 fatcat:fiew6nynevec7hrhzuie2m36hi

Decoding Substitution Ciphers by Means of Word Matching with Application to OCR

George Nagy, Sharad Seth, Kent Einspahr
1987 IEEE Transactions on Pattern Analysis and Machine Intelligence  
A substitution cipher consists of a block of natural language text where each letter of the alphabet has been replaced by a Manuscript  ...  ACKNOWLEDGMENT The authors wish to thank D. Kreher for an earlier implementation of the algorithm and C. Grimes for experimentation with dictionaries. The help by T. Meyer and S.  ...  As a problem in cryptography, the substitution cipher is of limited interest, but it has an important application in optical character recognition.  ... 
doi:10.1109/tpami.1987.4767969 fatcat:zq4s7f42vfeyjl6jng5hwo5gve

On group rings and some of their applications to combinatorics and symmetric cryptography

Claude Carlet, Yin Tan
2015 International Journal of Group Theory  
We give a survey of recent applications of group rings to combinatorics and to cryptography, including their use in the di erential cryptanalysis of block ciphers.  ...  In addition to the extensive theoretical research, group rings also receive attention for their applications to cryptography.  ...  R is a finite commutative ring with identity and G a finite Abelian group, since in many applications of group rings to combinatorics and cryptography, R is a subring of the complex field and G is the  ... 
doaj:702491ac19094ef9ab524daccc32967f fatcat:7f355cxdk5aexaf57rpkrikydm

An Automatic Design Flow for Data Parallel and Pipelined Signal Processing Applications on Embedded Multiprocessor with NoC: Application to Cryptography

Xinyu Li, Omar Hammami
2009 International Journal of Reconfigurable Computing  
And the overall multiprocessor architecture is still kept for additional applications. This provides a transition to software only parallel implementation while avoiding pure hardware implementation.  ...  Embedded system design is increasingly based on single chip multiprocessors because of the high performance and flexibility requirements.  ...  The main features of Arteris switch are (1) fully synchronous operation, (2) internal full crossbar: up to one data word transfer per MINI port and per cycle, (3) full throughput arbitration: up to one  ... 
doi:10.1155/2009/631490 fatcat:kcrbtxmc7jgd3jptwwrxqcuqf4

On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography [chapter]

Vasyl Ustimenko, Urszula Romańczuk
2013 Studies in Computational Intelligence  
We are going to observe special algebraic Turing machines designed for different assignments of cryptography such as classical symmetric encryption, public key algorithms, problems of secure key exchange  ...  In the case of symbolic computations with "sufficiently large number of variables" the order of generator (base of DLP) is impossible to evaluate and we have "hidden discrete logarithm problem".  ...  Multivariate cryptography is quite popular nowadays because it can be a possible option applicable to both conventional and quantum computers (see [15] ).  ... 
doi:10.1007/978-3-642-29694-9_10 fatcat:voi5gvpmgnegzds55voiwqp2ma

Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding

Naim BAFTIU
2020 Prizren Social Science Journal  
The application of cryptography has grown increasingly, ranging from limited use in state institutions to widespread use by private individuals and companies.  ...  Regarding the new paradigms in cryptography there are also new cryptographic schemes whose application requires detailed study and analysis.  ...  In other words, the relationship between letters in plaintext and cipher text are one-to-one. The simplest mono-alphabetic figure is the extra digit (or change digit).  ... 
doi:10.32936/pssj.v4i3.165 fatcat:5yyvjasqlfglddfyfv62jsk73a

Body language, security and e‐commerce

Norman Desmarais
2000 Library hi tech  
The encryption process could be as simple as substituting numbers for letters, such as A = 1, B = 2, C = 3, and so on.  ...  Public key infrastructure is a catch-all word used to refer to all the things required to implement and use public key technology.  ... 
doi:10.1108/07378830010314483 fatcat:5kiz4uvqwngqxnbgps5wh3rriu

Language-theoretic problems arising from Richelieu cryptosystems

Mircea Andraşiu, Gheorghe Paˇun, Ju¨rgen Dassow, Arto Salomaa
1993 Theoretical Computer Science  
Language-theoretic problems  ...  Such an application can obviously be carried out in real time. As usual in classical cryptography, in addition to security considerations, one has to deal here with problems of key management.  ...  In many cases, where the cryptographic mappings are based on number theory, the methods of traditional language theory are not applicable.  ... 
doi:10.1016/0304-3975(93)90327-p fatcat:tpe2vdv3offinadqw5bdhlbiru

A Hybrid Natural Language Information Hiding System

Lu He, Xiaolin Gui, Reifeng Wu, Biqing Xie, Chang Hu
2012 Elektronika ir Elektrotechnika  
According to this approach, we propose general embedding/extracting algorithms and develop a hybrid natural language information hiding (HYNLIH) system.  ...  However, the extant algorithms still face some serious problems, such as insufficient capacity, nonuniform distribution of cover unit, and lack of studies on data-hiding codes.  ...  information hiding applications as possible.  ... 
doi:10.5755/j01.eee.18.9.2817 fatcat:sfcktykjjfcppgx65r4yfkynaq

On Information Hiding in Natural Language Systems [article]

Geetanjali Bihani, Julia Taylor Rayz
2022 arXiv   pre-print
With data privacy becoming more of a necessity than a luxury in today's digital world, research on more robust models of privacy preservation and information security is on the rise.  ...  In this paper, we take a look at Natural Language Steganography (NLS) methods, which perform information hiding in natural language systems, as a means to achieve data security as well as confidentiality  ...  Recent developments in language models have eliminated the need for rule construction and allow quick access to alternative word choices for substitutions.  ... 
arXiv:2203.06512v1 fatcat:amvkiajuyzejbkemm2mpruu5yu

On Information Hiding in Natural Language Systems

Geetanjali Bihani, Julia Taylor Rayz
2022 Proceedings of the ... International Florida Artificial Intelligence Research Society Conference  
With data privacy becoming more of a necessity than a luxury in today's digital world, research on more robust models of privacy preservation and information security is on the rise.  ...  In this paper, we take a look at Natural Language Steganography (NLS) methods, which perform information hiding in natural language systems, as a means to achieve data security as well as confidentiality  ...  Recent developments in language models have eliminated the need for rule construction and allow quick access to alternative word choices for substitutions.  ... 
doi:10.32473/flairs.v35i.130602 fatcat:zgd26ndaqbdnphwqxiyypwvi4i
« Previous Showing results 1 — 15 out of 4,536 results