ENGINEERING RESEARCH PAPERS

cryptography IEEE PAPER 2017




Blockchain, cryptography , and consensus
free download

Page 1. Blockchain, cryptography , and consensus Christian Cachin (with Elli Androulaki, Angelo
De Caro, Andreas Kind, Mike Osborne, Simon Schubert, Alessandro Sorniotti, Marko Vukolic
and many more) IBM Research Zurich June 2017 Page 2. Consensus Four elements characterize

Cryptography using DNA Nucleotides
free download

ABSTRACT Cryptography plays a key role in information security. Many new algorithms and techniques have been used in the same regards. Cryptography using DNA computing is very current state of the art. DNA cryptography comes with the next level of data integrity and

Post-quantum cryptography -dealing with the fallout of physics success.
free download

Abstract Cryptography is essential for the security of Internet communication, cars, and implanted medical devices. However, many commonly used cryptosystems will be completely broken once big quantum computers exist. Post-quantum cryptography is Abstract. Isogeny based post-quantum cryptography is one of the most recent addition to the family of quantum resistant cryptosystems. In this paper we propose an efficient modular multiplication algorithm for primes of the form p= 2· 2 a 3 b− 1 with b even, typically used in

Methods for Protection of Key in Private Key Cryptography
free download

Abstract-The susceptible nature of information against forthcoming threats has become a ponderous affair for the professionals of this field. It is a result of the rational and steady struggle by the carrying people that has produced multiple approaches which shields vital

Intensify the security of One Time Password using Elliptic Curve Cryptography with Fingerprint for E-commerce Application
free download

Abstract: Security of one-time password (OTP) is crucial as a result of these days most of the e-commerce transactions are performed with the assistance of this mechanis m. OTP is employed to counter replay attack/eavesdropping. Replay attack or eavesdropping is o ne

Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud
free download

Abstract: Cloud computing is an Internet-based computing model which provides several resources through Cloud Service Providers (CSP) to Cloud Users (CU) on demand basis without buying the underlying infrastructure and follows pay-per-use basis. It supports

Mutual Authentication Mechanism using Pre-Shared Key and BB84 Quantum Key Distribution for Quantum Cryptography Communication
free download

Abstract. It is believed that the quantum cryptography based on quantum key distribution achieves unconditional security. However, the additional authentication mechanism applied to the quantum cryptography needs to be studied since it is difficult for the quantum

Study on Cryptography and Techniques
free download

ABSTRACT In todays information age, communication play a very important role which help in growth of new technologies. So security is an essential parameter to be considered. A mechanism is therefore needed to secure the information that is sent. The process of

Profiles for the Lightweight Cryptography Standardization Process
free download

Abstract This document describes the first two profiles for NISTs lightweight cryptography project. Profile I provides authenticated encryption with associated data (AEAD) and hashing functionalities for both hardware-oriented and software-oriented constrained environments.

A Review paper on Network Security and Cryptography
free download

Abstract With the advent of the World Wide Web and the emergence of ecommerce applications and social networks, organizations across the world generate a large amount of data daily. Information security is the most extreme basic issue in guaranteeing safe

Implementation For Data Hiding Using Visual Cryptography
free download

Abstract-Security and safety in each place need of protection, improvement. By this reason data transferring will secure and create need of improvement when transfer data every time. Visual cryptography with boundary steganography represent GUI (Graphical User Interface)

A Novel Weighted Visual Cryptography Scheme with High Visual Quality.
free download

Abstract Visual Cryptography (VC) has been developed to encode a secret image into n shares for n participants in the past decades, in which each share is treated with the same priority. However, the privilege for participants in a group is not always the same. In this

Integrating the functional encryption and proxy re- cryptography to secure drm scheme
free download

Abstract The current Digital Rights Management (DRM) systems use attribute-based encryption (ABE) and proxy re-encryption (PRE) to achieve fine-grained access control in cloud computing. However, these schemes have some limitations particularly in terms of

White-Box Cryptography : Dont Forget About Grey Box Attacks.
free download

Abstract. Despite the fact that all current scientific white-box approaches of standardized cryptographic primitives have been publicly broken, these attacks require knowledge of the internal data representation used by the implementation. In practice, the level of

A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model.
free download

Abstract Despite the fact that the traditional public key infrastructure provides Level 3 trusted authority, but its two major problems of scalability and certificate management raised the need to an alternative security infrastructure. That motivated the appearance of new

A novel Mutual Authentication algorithm using visual cryptography with novel visual cryptographic schemes
free download

Abstract-We proposed a mutual authentication scheme using visual cryptography . Traditionally text-based username and passwords are used to authenticate a user to any online service. Authentication using passwords are old as well as less reliable regarding

Secret Data Transmission Using Combination of Cryptography Steganography
free download

Abstract:-Secure communication is when two entities are communicating and do not want a third party to listen in. For that, they need to communicate in a way not susceptible to eavesdropping or interception. Two varieties of security mechanism, cryptography and

Information Theoretic Cryptography for Information Theorists (Notes for a tutorial at ISIT 2017)
free download

Randomness extraction refers to generating almost uniform bits as a function of a given random variable X. This will play a central role in all our applications, in particular, in the privacy amplification step of secret key agreement. The form of functions that can enable

A New Visual Cryptography Approach using Mosaic and Spread Spectrum Watermarking
free download

ABSTRACT Visual cryptography is a furtive distribution scheme where a screte image is encrypted into the shares which independently make known no information concerning the secret original image. The attractiveness of the visual surreptitious distribution method is its

Colour Based Cryptography
free download

Abstract-In the increasing concern of the data security, most commonly method is encryption of messege to cipher text message, which are based on various strategies to encode. traditional method is to convert the message to cipher text by substitution, swapping,

Dual Visual Cryptography Using the Interference Color of Birefringent Material
free download

Abstract Visual cryptography is a method of encrypting an image into several encrypted images. Conventional visual cryptography can display only monochrome images. We previously proposed a color visual cryptography method that uses the interference color of

Chaotic Cryptography : Applications of Chaos Theory to Cryptography
free download

Abstract In this paper, we discuss the history of Chaotic Cryptography , and main definitions surrounding chaos theory. We then attempt to implement an encryption scheme based upon Baptistas original construction in 1998. We then discuss the possibility of using chaotic

Color Visual Cryptography with Stacking Order Dependence Using Interference Color
free download

Abstract Visual cryptography is an encryption method that shares a secret image through several encrypted images. General visual cryptography has no stacking order dependence, and only one image can be decoded regardless of stacking order of encrypted images. We

Device independent quantum cryptography for finite samples
free download

Abstract Quantum cryptography promises levels of security that are impossible to replicate in classical world. In all the initial quantum cryptographic protocols, the involving parties trust the measurement devices involved in the protocol. Later it is shown that the security of the

White Paper for Wacom: Cryptography in the STU-541 Tablet
free download

This White Paper describes the new cryptographic security features designed into the STU 541 tablet and the benefits they bring. It is intended to be useful to anyone wanting to learn more about STU-541 cryptographic security, including those without a technical background,

Optimizing curve-based cryptography
free download

Cryptography has a very long history and dates back to the time of the Roman Empire. Cryptography enables a sender (often called Alice) to convert a message (plaintext) into a secret code (ciphertext) before sending to a receiver (often called Bob). Bob is able to

Video Piracy Detection Based on Audio Steganography, AES and DNA Cryptography
free download

Abstract: Data transmission in public communication system is prone to the interception and improper manipulation by eavesdropper. Audio Steganography is the procedure of hiding the existence of secret information by zipping it into another medium such as audio file. This

Symmetrically and Asymmetrically Hard Cryptography .
free download

Abstract The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memory complexity. For a variety of reasons, many algorithms have been proposed that, instead of optimizing, try to increase one of these hardness forms. We present for the

Visual Cryptography using Image Thresholding
free download

Abstract-This paper proposes a novel visual cryptographic algorithm using image thresholding. The technique used simple image thresholding to generate a keyless scheme with a minimal computational load. The approach creates two shares of images from the

Lossless and Reversible Data Hiding in Image Encryption Using Public-Key Cryptography
free download

Abstract Encryption is the process of encoding a message or information in such a way that only authorized parties can access it. Encryption does not of itself prevent interference, but denies the intelligible content to a would-be interceptor. Encryption is important because it

Dispersed Cryptography and the Quotient Ring Transform.
free download

Abstract This paper describes a radically different privacy, security and integrity solution. Dispersed Cryptography converts the cloud from a security threat into a security asset by combining a standard stream cipher and the Quotient Ring Transform (QRT). The result is an

A Refinement of Quantum Mechanics by Algorithmic Randomness and Its Application to Quantum Cryptography
free download

Abstract: The notion of probability plays a crucial role in quantum mechanics. It appears in quantum mechanics as the Born rule. In modern mathematics which describes quantum mechanics, however, probability theory means nothing other than measure theory, and

Technique to Enhance Information Security Using Hybrid Geometric Cryptography : A Review
free download

Abstract Cryptography is the science or art of transforming any data (plaintext) into one that is not understandable by unauthorized person (cipher text) and then transforming the message back to its original form (plaintext). Here, the information is encoded to some other Abstract. Addition chain calculations play a critical role in determining the efficiency of cryptosystems based on isogenies on elliptic curves. However, finding a minimal length addition chain is not easy; a generalized version of the problem, in which one must find a

A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes
free download

Abstract Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptography is splitting the secret image into

FPGA IMPLEMENTATION OF DES ALGORITHM USING DNA CRYPTOGRAPHY .
free download

ABSTRACT DNA Cryptography is the evolving cryptanalytic technology in the field of information security. Using this Cryptanalytic technology which involves in DNA Cryptography improves the security level to protect information from attackers. However all

Text Cryptography Using Two Stage Passkey Random Text
free download

Abstract This work is designed to optimize the password used to securely transfer text data. This article reviews the previous techniques and presents an advanced approach to transforming data from isolated common data into encrypted complex data, but enhances

Implementation Paper on Visual Cryptography for Sharing Digital Image Using Diverse Media
free download

Abstract As we know that todays era is working on very advance techniques with internet and traditional encryption techniques are just converting the readable images into some unreadable format ie cipher text format. This encrypted cipher text can be very conveniently

Cryptography : A Comparative Analysis for Modern Techniques
free download

Abstract Cryptography plays a vital role for ensuring secure communication between multiple entities. In many contemporary studies, researchers contributed towards identifying best cryptography mechanisms in terms of their performance results. Selection of

A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
free download

Abstract A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to

Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage.
free download

Abstract With the vast development in cloud computing model, various organizations and individuals often deploy the cloud without reviewing the security policies and procedures which can cause great risk in their business. Securing data in cloud storage becomes a

SECURITY IN MANETS USING CRYPTOGRAPHY ALGORITHMS
free download

Abstract-Mobile Ad-hoc Network (MANET) is an important field where many of the users are using mobile devices for last few years where ad-hoc routing in networks is one of the prominent issues. A malicious node can drop the routing information, data packets

Large Integer Arithmetic in GPU for Cryptography
free download

ABSTRACT Most computer nowadays support 32 bits or 64 bits of data type on various type of programming languages and they are sufficient for most use cases. However, in cryptography , the required range and precision are more than 64 bits which are

GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography
free download

Abstract: Lattice-based cryptography is one of the most promising areas within post-quantum cryptography , and offers versatile, efficient, and high performance security services. The aim of this paper is to verify the correctness of the discrete Gaussian sampling component, one

Improved Way to Enhance Information Security Using Hybrid Cryptography on WSN: A Research
free download

Abstract The popularity of Wireless Sensor Networks (WSN) has increased rapidly and tremendously due to the vast potential of the sensor networks to connect the physical world with the virtual world. Since sensor devices rely on battery power and node energy and may

Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks
free download

ABSTRACT The Internet of Things (IoT) depicts a giant network where every thing can be interconnected through the communication network. The communication can be initiated between peoplepeople, people-things, and things-things. Meanwhile, the fifth generation

Cryptography : A Review
free download

Abstract--In todays Internet world security plays a very important role in securing data. After noticing constant reports of data theft and hacking, enhancing security of the data has become mandatory. Before a secure algorithm is proposed, it is necessary to review the

Secure Multicast Communication using RSA and DNA Cryptography
free download

ABSTRACT: Security in communications especially in group communication plays a major role in todays world and it has to be implemented properly with the help of an efficient and robust encryption and decryption methodology. In a Multicast communication the media

Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
free download

Abstract Numerous advancements in the Information Technology (IT) require the proper security policy for the data storage and transfer among the cloud. With the increase in size of the data, the time required to handle the huge-size data is more. An assurance of security in

CRYPTOGRAPHY AND ERROR CORRECTION CODE FOR IRIS BIOMETRIC RECOGNITION SYSTEM
free download

Abstract: Digital image processing is the use of computer algorithms to perform image processing on digital images. As a subcategory or field of digital signal processing, digital image processing has many advantages over analog image processing. It allows a much

Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes.
free download

Abstract Cost-aware cut-and-choose game is a fundamental technique that has many cryptographic applications. Best existing solutions of this game assumed for simplicity that the number of challenges is publicly known. This paper considers an extension of this game

An Anti-phishing Framework Based on Visual Cryptography
free download

Abstract-Due to immense use of internet, online attack has increased. Among that, phishing attack is the most common one. Phishing is an act carried by an individual or a group to access personal information such as credit card details, passwords etc for financial gain and

The Role of Mathematics in Emergence of Cryptography : A Review
free download

ABSTRACT Cryptography is an art of developing techniques of writing messages in a secret way and ensuring the security in communication. Earlier, the use of cryptography was restricted to the safety of information in diplomatic and military areas. With the growth in e-

Markov Chains: A Random Walk Through Particles, Cryptography , Websites, and Card Shuffling
free download

Abstract In this paper, I will discuss the origins of Markov chains, the theory behind them, and their convergent quality seen in the Ergodic theorem. From there, I will outline the Metropolis-Hastings algorithm, one of the most important applications of Markov chains, and

QR Code Resistant Key Logging Based Visual Cryptography
free download

Abstract: The main aim here is to develop a combination of text and color QR Code based authentication mechanism passwords for session authentication instead of traditional textual passwords. Most existing methods have been subjected to lots of attacks. Even two factor

Game-based cryptography in HOL
free download

Abstract In this AFP entry, we show how to specify game-based cryptographic security notions and formally prove secure several cryptographic constructions from the literature using the CryptHOL framework. Among others, we formalise the notions of a random oracle,

Review on Network Security and Cryptography
free download

ABSTRACT On the internet with the advent of world wide web, world generate a large amount of data daily. Data security is use for safe the information through the internet. Also network security issues are now becoming important as society is moving towards digital

Performance Analysis for IDBAS and LWSEA Cryptography Technique in Generic Bio-Inspired Cybersecurity in SIWC model for WSN
free download

ABSTRACT The expeditious advances of Information Technology (IT) and Communication Technology have led in various Cyber-Physical Systems (CPSs) such as smart traffic flow management, healthcare platforms, Internet of Things and computer networks. In current

Sybil Attack Prevention in WSN Using Elliptic Curve Cryptography and Genetic Algorithm
free download

Abstract: Wireless Sensor Network (WSN) is an evolving technology that is employed in numerous applications in real time fields including health, mass public, disaster detection and environmental monitoring. WSN contains a large number of sensor nodes to monitor AIT Based Cryptography
free download

Security for cryptographic systems is based on two main approaches: computational security and information-theoretic security. In the first approach on tries to design a system in such a way that an attacker can not feasibly break it within a reasonable amount of time. These are

A FINGERPRINT BIOMETRIC PRIVACY USING VISUAL CRYPTOGRAPHY
free download

Abstract-Biometric authentication systems are gaining widespread popularity in recent years due to the advances in sensor technologies as well as improvements in the matching algorithms. Preserving the privacy of digital biometric data stored in a central database has

Sharper bounds in lattice-based cryptography using the Rényi divergence
free download

Abstract. The Rényi divergence is a measure of divergence between distributions. It has recently found several applications in lattice-based cryptography . The contribution of this paper is twofold. First, we give theoretic results which renders it more efficient and easier to

Advance Halftone Secure Secret Sharing Scheme with Error Diffusion Technique Along with Adaptive Secure Confidential Key in the Visual Cryptography
free download

Abstract In the area of medicine, storing medical images of the patient in a very secure manner becomes to be toughest challenge. As the development in the digitalization of medicine, medical images security becomes critical issues for providing the secure

A Bibliography of Publications on Cryptography : 1990 1999
free download

Nelson HF Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM b

A Complete Bibliography of Publications in Designs, Codes, and Cryptography
free download

(0, 1) [628]. (0, 2) [962]. (0, 2,t) [637]. (0,α) [696,844]. (1, −1) [518]. (1, 2) [1269]. (17,9) [351]. (17q, 17, 2) [364]. (2) [1198]. (2, 2) [1179]. (2, 27) [1431]. (2,7) [1432]. (2, 8) [667,1133]. (2,n) [904]. (2,q) [1432]. (2,qn) [1231]. (255,k) [657]. (25q, 25, 3) [364]. (28, 12, 11) [117]. (2n)

Identity-based cryptography with Outsourced Revocation in Cloud Computing
free download

ABSTRACT Identity-Based Encryption (IBE), which make simple to the public key and credential management at Public Key Infrastructure (PKI) is a significant option to public key encryption. However, one of the most important competence drawbacks of IBE is the

The Advantages of Elliptic Curve Cryptography for Security
free download

Abstract Elliptic Curve Cryptography has been a recent research area in the field of Cryptography . It provides higher level of security with lesser key size compared to other Cryptographic techniques. This paper provides an overview of ellipticcurves and their use in

Hyperchaos based Cryptography : New Seven Dimensional Systems to Secure Communications
free download

ABSTRACT The growth of technology and the emphasis on privacy have intensified the need to find a fast and secure cryptographic method. As chaotic signals are usually noise like and chaotic systems are very sensitive to the initial condition, they can be used in

LPN in Cryptography : an Algorithmic Study
free download

Abstract The security of public-key cryptography relies on well-studied hard problems, problems for which we do not have efficient algorithms. Factorization and discrete logarithm are the two most known and used hard problems. Unfortunately, they can be easily solved

POST-QUANTUM CRYPTOGRAPHY WITH QUASI-CYCLIC MODERATE-DENSITY PARITY-CHECK CODES
free download

The purpose of this thesis is to examine if Quasi-Cyclic Moderate-Density Parity-Check (QC MDPC) codes is a good family of error-correcting codes to replace the family of Goppa codes in the McEliece cryptosystem. This cryptosystem is one of a few cryptosystems which

A Survey on ACO and Cryptography Techniques for Cloud Computing Security and Privacy
free download

Abstract Cloud computing is a technology evolution of adoption of virtualization, service oriented architecture and utility computing over the internet including applications, platform and services. Cloud security and privacy is a biggest concern about cloud computing,

Transfer of Data with Secured Methods like Image Elliptic Curve Cryptography and Steganography
free download

Abstract: Securing information is a testing issue in todays time. Remembering it we have proposed another procedure which is the mix of Elliptic Cryptography and picture Steganography improved with another safe component for era of another, hearty security

Application of differential cryptography to a GN authentication hierarchy scheme
free download

Abstract. Starting from the classical differential cryptography , we describe how to construct particular parameters for elliptic curves with application to the domain of information security. These results conclude to a key used on symmetrical encryption. The article will review a

Analysis of Post-Quantum Cryptography Use in Practice
free download

A Gagnidze, M Iavich, G Iashvili - Bull. Georg. Natl. Acad. Sci, 2017 - science.org.ge ABSTRACT. Quantum computers are able to destroy most, if not absolutely all conventional cryptosystems that are widely used in practice, specifically, systems based on the problem of factoring integers (eg, RSA). Some cryptosystems like RSA system with 4 000-bit keys are

Crafting Certified Elliptic Curve Cryptography Implementations in Coq
free download

Abstract Elliptic curve cryptography has become a de-facto standard for protecting the privacy and integrity of internet communications. To minimize the operational cost and enable near-universal adoption, increasingly sophisticated implementation techniques have

A comprehensive investigation of visual cryptography and its role in secure communications.
free download

Abstract: Secret sharing approach and in particular Visual Cryptography (VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography . VC takes an image (secret)

An investigation of visual cryptography and its applications in secure communications
free download

Abstract Secret sharing approach and in particular Visual Cryptography (VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography . VC takes an image (secret)

IMPLEMENTATION OF HASH FUNCTION FOR CRYPTOGRAPHY (RSA SECURITY)
free download

ABSTRACT: In this thesis, a new method for implementing cryptographic hash functions is proposed. This method seeks to improve the speed of the hash function particularly when a large set of messages with similar blocks such as documents with common Headers are to

CRYPTOGRAPHY IN CREATIVE MEDIA
free download

ABSTRACT This paper argues the value of a creative approach to encryption. The first part of the text includes a survey of historical and modern examples of encryption in art, writing, and music to demonstrate the merit and purpose of cryptography in creative media. The

MODIFICATION AFFINE CIPHERS ALGORITHM FOR CRYPTOGRAPHY PASSWORD
free download

ABSTRACT Computers as a means of storing and transmitting data, information, and confidential documents are important and can often be easily accessed by people who are not responsible. Security and confidentiality of data on computer networks today become a

Secured Mobile Biometric Authentication using (2, 2) Visual Cryptography
free download

Abstract-Biometrics is the measurement and statistical analysis of peoples physical and behavioural Characteristics. Biometrics deals with automated method of identifying a person or verifying the identity of a person based on the physiological or behavioral characteristic, Generating elliptic curves for cryptography
free download

Abstract. Elliptic curve cryptography (ECC)[1, 2] is a very efficient technology for implementing public key cryptosystems and public key infrastructures (PKI), it offers encryption/decryption, digital signature, and key exchange solutions. During the last decade,

ASurvey ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
free download

ABSTRACT Digital communication witnesses a noticeable and continuous development in many applications in the Internet. Hence, a secure communication sessions must be provided. The security of data transmitted across a global network has turned into a key

XOR OPERATED VISUAL CRYPTOGRAPHY
free download

Abstract: Visual Cryptography is a method for protecting image-based secrets that has a computation-free decoding process. In this paper, we describe a method which can be used to share an image with at least 256 colours into two meaningful cover images. We use a

A Short Survey of Visual Cryptography and Secret Image Sharing Techniques and Applications
free download

Abstract: Cryptography , in general, is a process of transforming original information into a format such that it is only read by the desired recipient. Visual cryptography (VC) scheme is a cryptographic technique which allows visual information to be encrypted in such a way that

ELLIPTIC CURVES AND CRYPTOGRAPHY
free download

The history of cryptography is long and interesting. It had a very considerable turning point when two researchers from Stanford, Whitfield Diffie and Martin Hellman, published the paper New Directions in Cryptography in 1976. They preface the new idea of public key

On the Computation of Reed-Muller Spectra for Cryptography and Switching Theory Applications
free download

Abstract We survey a variety of methods that allow for the Reed-Muller spectrum, also known as the Algebraic Normal Form (ANF), to be computed for functions of a large number of variables. Some of the methods are previously known while others may be new to the

Progressive Visual Cryptography with Friendly and Size Invariant Shares
free download

Abstract: Visual cryptography is an important data encoding method, where a secret image is encoded into n pieces of noiselike shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human naked eye; this cannot

Secure Mobile Payment System Using Symmetric Cryptography in Ethiopia
free download

Abstract Mobile payment allows users to perform payment transactions through their mobile phones. However, security issues are by far the greatest deterring factors that limit the popularity of this payment system. The problem is lack of sufficient security mechanisms with

IMPLEMENTATION ON DATA HIDING CRYPTOGRAPHY BY USING DIFFERENT SECURITY ALGORITHMS WITH USER AUTHENTICATION
free download

ABSTRACT In this paper, data hiding a form of steganography or cryptography embeds data into digital media for the purpose of identification, annotation, and copyright. In this paper, various type of data such as text, image, audio, video, and documents hide by using different

A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC
free download

Abstract e are in the era of digital revolution and the benefits are remarkable. People are much dependent on digital technology and cant survive without it. With the advancement of Internet and its applications, we share a wide range of data including texts, images, audios

An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP
free download

Abstract. Information in patients medical histories is subject to various security and privacy concerns. Meanwhile, any modification or error in a patients medical data may cause serious or even fatal harm. To protect and transfer this valuable and sensitive information in

Cognitive Processing of Cryptography Concepts: An fMRI Study
free download

Abstract This study investigated the effects of using Model Eliciting Activities that build representational fluency on the cognitive processing of selected cryptography concepts. The study used an experimental design where in the control group the cryptography concepts

A Simple Chaotic Image Cryptography Algorithm Based on New Quadratic Chaotic Map
free download

Abstract The chaos based cryptographic methods have been suggested some new and efficient algorithms to develop image encryption techniques because of its exceptionally desirable properties of sensitivity to initial condition and parameters of chaotic map.

ANew XOR-BASED VISUAL CRYPTOGRAPHY SCHEME FOR AUTHENTIC REMOTE VOTING SYSTEM
free download

ABSTRACT The current technological era demands high security and verifiability, especially in the Remote Voting System (RVS) through the Internet in order to resist the cheating case in election process. In this paper, a new Visual Cryptography (VC) scheme is proposed to Post quantum cryptography
free download

Abstract. A quantum computer with Shors algorithm will solve the integer factorization and the discrete logarithm problems upon which most of the widely used cryptosystems such as RSA (Rivest, Shamir, Adleman) and ECC (elliptic curve cryptography ) are based. This year was marked by the fifth edition of the International Workshop on Lightweight Cryptography for Security and Privacy (LightSec). With the increasing deployment of ubiquitous systems and pervasive computing, the field of low-resource cryptography is

Combinatorial Optimization in Cryptography
free download

Abstract The known attacks on different cryptosystems lead to a number of criteria that the implemented cryptographic algorithms (ciphers) must satisfy. The design of cryptographic systems needs to consider various characteristics simultaneously, which can be regarded as

Cryptography System for Information Security Using Chaos Arnolds Cat Map Function
free download

Abstract. This study aims to apply the Chaos Theory in cryptography . Chaos theory is a very complex, irregular and random behavior in a deterministic system. Chaos has a random nature, a slight change of course will generate different numbers, and it is useful in

FREE IEEE PAPERS
IEEE PROJECTS
GLASS CLIMBING ROBOT
GPS TRACKING SYSTEM
ROBOTICS ARMY
CLOUD SECURITY
SOLAR ENERGY
SECURITY SYSTEM

BIG DATA
CLOUD COMPUTING
IOT-INTERNET OF THINGS
ROBOTICS
CONTACT US





NEW IEEE PROJECTS