ENGINEERING RESEARCH PAPERS

CRYPTOGRAPHY IEEE PAPER 2018




A Survey of Authentication of RFID Devices Using Elliptic Curve Cryptography
free download

ABSTRACT RFID is a wireless technology for automatic identification and data capture and its the core technology to implement the internet of things. Because of that, the security issue of RFID is becoming more important. In past, simple mathematical and logical method, hash

A Survey on Image Cryptography Using Lightweight Encryption Algorithm
free download

ABSTRACT In the present scenario, any communication of internet and networks application requires security as it is very much crucial part over a network. Lots of data security and data hiding algorithms have been developed in the last decade for such purpose. Cryptography

Design a Finite Field Multiplier for Novel Cryptography
free download

ABSTRACT The process to develop a federal information processing standard for the advanced encryption algorithm to replace the data encryption standard. In this paper, we proposed an efficient VLSI architecture for advanced encryption standard design

SECURE FILE STORAGE ON CLOUD USING CRYPTOGRAPHY
free download

ABSTRACT In this paper we aim to securely store information into the cloud, by splitting data into several chunks and storing parts of it on cloud in a manner that preserves data confidentiality, integrity and ensures availability. The rapidly increased use of cloud

Secure Transmission of Video using (2, 2) Visual Cryptography Scheme and Share Encryption using Logistic Chaos Method
free download

ABSTRACT The crucial issue on World Wide Web is the security of communication and authentic transmission of confidential multimedia elements. Web has progressed towards becoming most ordinarily utilized media for communication and consequently message

Exploiting Ineffective Fault Inductions on Symmetric Cryptography
free download

ABSTRACT . Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and new techniques for fault attacks and countermeasures have been studied extensively. The vast majority of the literature on fault attacks focuses on the ability of fault When a secret is revealed, it is the fault of the man who confided it. Faults can be catastrophic for cryptosystems! In most cases, even a single well-formed fault is sufficient to reveal secret keys of the underlying ciphers. Even mathematically strong ciphers like the

Implementation of Random Image Visual Cryptography
free download

ABSTRACT -Here new encryption technique is proposed. Steganography and Visual Cryptography is used together to add multiple layers of security. Using Steganography, the secrete text message is hidden in a cover image. The stenographer image is now sliced into

Critical Analysis of Cryptography and Steganography
free download

ABSTRACT Digital communication has become an essential part of infrastructure in the present world and it has witnessed a noticeable and continuous development in a lot of applications during last few decades. Nowadays, almost all applications are Internet-based

E-learning system using cryptography and data mining techniques
free download

ABSTRACT -E-learning is one amongst the foremost wide used technique for the education. In this paper, we have introduce e-learning platform in which system provides security to learning material and for candidate as well. We are aiming to implement the application of

Misuse-resistant cryptography for JOSE/JWT
free download

ABSTRACT The JSON Object Signing and Encryption (JOSE) standards [15, 17] are widely used in the OAuth 2.0 community, both in standards building on top of the core protocol, such as OpenID Connect, and behindthe-scenes in some implementations asstateless

A PROBABILISTIC MODEL OF VISUAL CRYPTOGRAPHY SCHEME FOR ANTI-PHISHING
free download

ABSTRACT : Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. The first defense should be

A Bibliography of Publications on Cryptography : 1990 1999
free download



A Complete Bibliography of Publications in Designs, Codes, and Cryptography
free download



An Efficient Data Embedding Techniques in Image using Levelling of 2-D DWT and Cryptography
free download

ABSTRACT The protecting mystery of delicate information turns out to be essential in today computerized correspondence. Steganography is the train of trading top mystery data by installing it into a mixed media bearer and Cryptography is the specialty of securing data by

ITL BULLETIN FOR FEBRUARY 2018 SECURING TOMORROWS INFORMATION THROUGH POST-QUANTUM CRYPTOGRAPHY
free download

Background In recent years, there has been a substantial amount of research on quantum computers machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum

Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography
free download

ABSTRACT . Constant-time polynomial multiplication is one of the most time-consuming operations in many lattice-based cryptographic constructions. For schemes based on the hardness of Ring-LWE in power-of-two cyclotomic fields with completely splitting primes, the

Combined Cryptography And Digital watermarking For Secure Transmission of Medical Images in EHR Systems
free download

ABSTRACT Telemedicine uses telecommunication and information technology is uesd to provide clinical health care from distance. The information privacy and security issues continue to plague telemedicine, especially due to the extensive use of new communication

CLASSICAL CRYPTOGRAPHY FOR KURDISH LANGUAGE
free download

ABSTRACT The most important concern in different data communication and transmission is to secure this data for every county individually. To transmit data through unsecure channel we need to use cryptographic algorithms, Kurdish language spoken by more than five

Secure File Storage in Cloud Computing Using Hybrid Cryptography Algorithm
free download

ABSTRACT In the cloud environment, resources are shared among all of the servers, users and individuals. So it is difficult for the cloud provider to ensure file security. As a result, it is very easy for an intruder to access, misuse and destroy the original form of data. In case of

Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography
free download

ABSTRACT Lattice-based cryptography one of the leading candidates for post-quantum security, relies heavily on discrete Gaussian samplers to provide necessary uncertainty, obfuscating computations on secret information. For reconfigurable hardware, the

An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC)
free download

ABSTRACT Elliptical curve cryptography (ecc) is a public key encryption approach based on elliptic curve idea that may be used to create quicker, smaller, and greater green cryptographic keys. Ecc generates keys through the houses of the elliptic curve equation in

The Importance of the Using Software Tools for Learning Modern Cryptography
free download

Because of the wide application of cryptographic mechanisms in private and business environments, a cryptography course at many universities has the great importance today. An undergraduate cryptography course is mathematically demanding, and it is quite difficult

Encryption and Decryption of Color Images using Visual Cryptography
free download

ABSTRACT The visual cryptography is a type of cryptography that allows digital images to be divided into multiple numbers of printable shares called transparent shares. The images are transmitted after applying the visual cryptographic technique. The hacker cannot understand

Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud
free download

ABSTRACT : Cloud computing is an Internet-based computing model which provides several resources through Cloud Service Providers (CSP) to Cloud Users (CU) on demand basis without buying the underlying infrastructure and follows pay-per-use basis. It supports

Digital Content Security with Quantum Cryptography
free download

ABSTRACT : The only perfect cryptographic algorithm that cannot be solved is the One-Time Pad. This algorithm was found in 1917 by Major Joseph Mauborgne. Cipher is included into the group symmetry algorithm. Onetime pad system cannot be solved due to two reasons

ASYMMETRIC AND SYMMETRIC CRYPTOGRAPHY TO SECURE SOCIAL NETWORK MEDIA COMMUNICATION: THE CASE OF ANDROID-BASED E
free download

ABSTRACT Pemahan Omah@ UMBis an Android-based server-less e-learning software that uses social network media as its main communication channel to avoid the burden of maintaining a course management system server and its supporting infrastructure. In the first

Development Of A Client/Server CryptographyBased Secure Messaging System Using RSA Algorithm
free download

ABSTRACT The efficiency and effectiveness of the information systems, in many ways, depend on its architecture and how data are transmited among different parties. Similarly, a very crucial aspect in the software development is the security of data that flows through

Securing Wireless Sensor Networks Using Elliptic Curve Cryptography
free download

ABSTRACT Wireless Sensor Networks have been an active area of research owing to its myriad range of applications. Traditional security protocols are not feasible for such networks due to their resource constraint nature. However, ECC has been considered as a viable

Text Message Encoding Based on Elliptic Curve Cryptography and a Mapping Methodology
free download

ABSTRACT : Elliptic Curve Cryptography (ECC) is a public-key cryptosystem which can be used for message encryption, key agreement protocols and digital signature applications. ECC offers high level of security with smaller key sizes makes it ideal for applications which run

Synthesis of Cellular Automata Cryptography using AES Algorithm
free download

ABSTRACT Secure system is most important part in the data communication. A digital media can be transmitted easily in real time anywhere at any time due to the multimedia technology and internet, but to maintaining a security of information is a biggest problem now a days

About Some Perspective Training Cryptography Disciplines
free download

ABSTRACT The work contains proposals for new training disciplines on cryptography that go beyond the traditional disciplines such as Cryptographic methods of information protection, specifying and supplementing them. Particular attention is paid to the content of disciplines

Enhancing Personalized Web Search Protection Using Cryptography Algorithm
free download

ABSTRACT : Over the last twenty years, there has been a extensive growth in the amount of private data collected about individuals. This data comes from a number of sources including medical, financial, library, telephone, and shopping records. Such data can be

FURNISHING CERTAINTY TO SKIPCLOUD BY DEPLOYING VISUAL CRYPTOGRAPHY TACTICS
free download

ABSTRACT : Now a days authentication plays a prominent mantle in each and every cloud services. As a part of security, it is not safe to be contingent on text watchwords and incisive image watchwords. And also services provided systems must to be further secure and

Systematic Generation of Fast Elliptic Curve Cryptography Implementations
free download

ABSTRACT Widely used implementations of cryptographic primitives employ number-theoretic optimizations specific to large prime numbers used as moduli of arithmetic. These optimizations have been applied manually by a handful of experts, using informal rules of

A Study of Non-Abelian Public Key Cryptography
free download

ABSTRACT Nonabelian group-based public key cryptography is a relatively new and exciting research field. Rapidly increasing computing power and the futurity quantum computers [52] that have since led to, the security of public key cryptosystems in use today, will be

Public key cryptography based on the clique and learning parity with noise problems for post-quantum cryptography
free download

ABSTRACT In this paper we propose a new method for public key encryption. The schemes security is based on the well-known clique and learning parity with noise problems. The relevance of this approach is justified by its post-quantum nature: unlike RSA and other

Multi Secret Image Sharing Scheme based on DNA Cryptography with XOR
free download

ABSTRACT In the digital era protecting digital media information is becoming more necessary. The source of digital medias growth can be linked to the wealth of information provided by the internet. Image encryption is the encrypting technologies of time-honored cryptography

A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography
free download

ABSTRACT Chaos theory has been widely studied and adapted in cryptography for achieving some security mechanisms, such as encryption/decryption, key agreement and hash function. The privacy of using chaos cryptography mostly relies on one of or the combination

A PROBABILISTIC MODEL OF VISUAL CRYPTOGRAPHY SCHEME FOR ANTI-PHISHING
free download

ABSTRACT Cell discontinuous transmission (DTX) has been proposed as a solution to reduce the energy consumption of cellular networks. This paper investigates the impact of network traffic load on the spectral and energy efficiency of cellular networks with DTX. The signal-to
BIG DATA
CLOUD COMPUTING
IOT-INTERNET OF THINGS
ROBOTICS
CONTACT US

NEW IEEE PROJECTS

IEEE PROJECT PAPERS FOR CSE
IEEE PROJECTS DOWNLOAD
IEEE PROJECTS FOR EEE
IEEE PROJECT PAPERS FOR ECE
IEEE PROJECTS FOR ECE 2016
IEEE PROJECTS FOR ECE 2017
IEEE PROJECTS 2017
IEEE MINI PROJECTS