Filters








4,000 Hits in 3.4 sec

Group security using ECC

Purna Chandra Sethi, Neelima Sahu, Prafulla Kumar Behera
2021 International Journal of Information Technology  
In this paper, we have proposed a group security algorithm using the ECC cryptography algorithm. The group security is applied to ECC in terms of m-gram selection called ECC m-gram selection.  ...  We have also made the comparison study between the traditional ECC algorithm with the proposed group security algorithm using generalized frequent-common gram selection for depicting lesser time requirements  ...  Introduction The use of computers as well as computer-related activities over the internet growing exponentially day by day.  ... 
doi:10.1007/s41870-021-00613-1 pmid:33681699 pmcid:PMC7917541 fatcat:qxzdzqpqqnez5dvucozcorbtqy

Implementation of Modified Playfair CBC Algorithm

Gaurav Sharma, Priyanka Goyal, Shivpratap Singh Kushwah
2016 International Journal of Engineering Research and  
These days, Information Security is the most summon aspects in the web and network application due to their swiftly origination. Therefore, secure exchanged data over the internet is vital.  ...  In this context, cryptography is used that converts information from its normal form into an unreadable form by using encryption techniques.  ...  To achieve the security goals, cryptography involves three distinct mechanisms: symmetric key cryptosystem (sometimes called symmetric key cryptography, secret key cryptography or private key cryptography  ... 
doi:10.17577/ijertv5is060631 fatcat:wdbyqrxejfgtfnpw3dom2dyp7e

A SELF-STUDY COURSE IN BLOCK-CIPHER CRYPTANALYSIS

Bruce Schneier
2000 Cryptologia  
introduction, and conclusion|and then again trying to break the algorithm for at least another three days.  ...  Vanstone, Handbook of Applied Cryptography CRC Press, 1997. Concentrate on the chapters on block ciphers, but I recommend strongly that you read the entire books.  ... 
doi:10.1080/0161-110091888754 fatcat:pa5bgnijpfbofoybhvtdqiknmi

Transaction Security Using Input Based Shared Key Cryptography

Mayank Swarnkar
2012 IOSR Journal of Computer Engineering  
Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions.  ...  Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Base station from where the transaction is much more secure as compared to wireless network.  ...  The encryption decryption method is secure from attacks in the wireless medium and can be easily implemented on database systems with crucial transactions.  ... 
doi:10.9790/0661-0755560 fatcat:um4g2ymdtnevtfbkv36gacf3t4

Appositeness and usage of Visual Cryptography: An Exploration

2019 International Journal of Engineering and Advanced Technology  
This paper centers around the application zones of visual cryptography from four distinctive research papers/diaries which talk about the most critical application regions of visual cryptography.  ...  In this paper, we expect to think about the extraordinary application zones of Visual Cryptography.  ...  Visual Cryptography Properties Used in Day-to-Day Application Areas In [15] , [17] , [18] , [20] , the creators have utilized another measurement to depict properties of visual cryptography in fields  ... 
doi:10.35940/ijeat.f1358.0986s319 fatcat:t43iwzi4ojh5lhclchshey2dwa

Secure User Authentication by using Biometric and Keystroke in Cloud

Sagar ShankarraoDake, Hemanta kumar Mohanta, Yechuri Durga Prasad
2014 International Journal of Computer Applications  
The combination of keystroke biometric, voice authentication and cryptography is more efficient to authenticate the user and provide more security.  ...  Keystroke biometrics is based on the assumption the typing pattern of each user is unique and cryptography in use to secure the password. By using voice authentication password will reset.  ...  In a Feistel network input data Xi of size n is divided into two or more parts, Eiand Di. Then the right side Di is altered according to a function F (Feistel function), that may be defined by.  ... 
doi:10.5120/18237-9265 fatcat:oalcuo3r3bejxmw66gzufxu3pi

A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY

Prashant B Swadas .
2014 International Journal of Research in Engineering and Technology  
To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities.  ...  It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique  ...  ACKNOWLEDGEMENTS We would like to thank reference authors and also like to thank the anonymous reviewers,whose comments and suggestions have helped them to improve the quality of the originalmanuscript  ... 
doi:10.15623/ijret.2014.0301029 fatcat:xeh2rftt4nfdxfah4hcxn2fhei

A Study of Digital Currency Cryptography for Bbusiness Marketing and Finance Security

Tai-hoon Kim
2016 Asia-pacific Journal of Multimedia services convergent with Art Humanities and Sociology  
The Age of the Internet has finally brought upon us a new phenomenon known as digital currency cryptography. No intermediaries. No service charges. No legal fees. No delays.  ...  A medium of exchange is an intermediary used in trade or business to avoid the inconveniences of a pure barter system.  ...  Other types of digital currency cryptography which had low market capitalization have died and some survived until the present.  ... 
doi:10.14257/ajmahs.2016.01.42 fatcat:gwsgv45sg5bpveakhmk6prfyau

Page 2978 of Mathematical Reviews Vol. , Issue 2002D [page]

2002 Mathematical Reviews  
The author proves that this method based on the standard binary notation system cannot be improved further.” 2002d:94044 94A60 1IT71 94A62 Ye, Dingfeng (PRC-ASBJ-SC; Beijing) ; Dai, Zongduo (PRC-ASBJ-SC  ...  in plaintexts for efficient cryptography (317-330).  ... 

How Not to Protect Your IP – An Industry-Wide Break of IEEE 1735 Implementations [article]

Julian Speith, Florian Schweins, Maik Ender, Marc Fyrbiak, Alexander May, Christof Paar
2021 arXiv   pre-print
We practically demonstrate the weaknesses by recovering the private keys of IEEE 1735 implementations from major Electronic Design Automation (EDA) tool vendors, namely Intel, Xilinx, Cadence, Siemens,  ...  In this paper, we outline structural weaknesses in IEEE 1735 that cannot be fixed with cryptographic solutions (given the contemporary hardware design process) and thus render the standard inherently insecure  ...  )) di ĉ[d̂[i]] = ĉ[π (di )] = rπ(π−1 (di )) · c = rdi · c .  ... 
arXiv:2112.04838v1 fatcat:kr5extcefvgrtdgarejgkcix5u

Introduction to Linguistic Steganography

Majid Khan, Ali Shahab, Zeeshan Asghar
2015 Nonlinear Engineering  
Steganography is an innovation where advanced information pressure, data hypothesis, spread range, and cryptography innovations are united to fulfill the requirement for security on the Internet.  ...  In simple terms, steganography is the art and science of hiding information in plain sight.  ...  Case in point, you could concur with your contacts to trade apparently harmless day by day climate reports via email.  ... 
doi:10.1515/nleng-2015-0013 fatcat:sr4ssf47w5a3dnnj2ngpznzjme

Improvement over Public Key Cryptographic Algorithm

Deepak Garg, Seema Verma
2009 2009 IEEE International Advance Computing Conference  
The paper is to only one signature verification in the complete day at then lu in th t setion. receiver side.  ...  Then our proposed generation can be in huge amount in a single day as compared scheme is shown with the result analysis.  ...  There are, in general, two types of cryptographic day by day. schemes typically used to accomplish these goals: secret 2.1 Working of RSA key (or symmetric) cryptography, public-key (or In RSA algorithm  ... 
doi:10.1109/iadcc.2009.4809104 fatcat:c4eahhg4qbe6fest764flwtfji

Quantum Computing and the Future Internet [article]

Tajdar Jawaid
2022 arXiv   pre-print
One of the biggest concerns among cybersecurity professionals these days is the hype around quantum computing, its incomprehensible power, and its implications.  ...  The advancement in quantum computing has the potential to revolutionize our daily lives, but it can also completely break down the Internet as we know it.  ...  to break current cryptography. e parallel research and advancement in the eld of quantum cryptography algorithms like NIST "Post-Quantum Crypto Project" and ETSI "Workshops on Quantum-Safe Cryptography  ... 
arXiv:2203.06180v1 fatcat:rxlhw5iblvaijobdqnhfmcwela

Java Cryptography Uses in the Wild [article]

Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz
2020 arXiv   pre-print
[Method] We used a static analysis tool to analyze hundreds of open-source Java projects that rely on Java Cryptography Architecture, and manually inspected half of the analysis results to assess the tool  ...  [Background] Previous research has shown that developers commonly misuse cryptography APIs.  ...  Developer feedback Out of 216 repository maintainers, 76 did not respond, and 140 reacted to the issues within 20 days.  ... 
arXiv:2009.01101v1 fatcat:jbiyhh5zi5hntdztfmbjr6qnne

A Review on Various Implemented Techniques for Visual Cryptography

Amit Kumar, Anurag Jain
2016 International Journal of Computer Applications  
The area of Visual Cryptography has progressed progressively over the past some years.  ...  The expansion of digital information and telecommunication systems released a extensive collection of novel possibilities which were grab to get better the effectiveness of different sorts of procedures  ...  Arce, and Giovanni Di Crescenzo planned halftone visual cryptography which amplifies the feature of the significant shares.  ... 
doi:10.5120/ijca2016912314 fatcat:zsqlqlfyvzherpgsltra4pecj4
« Previous Showing results 1 — 15 out of 4,000 results