cryptography research papers-22

cryptography research papers-22





Securing communication in WSN trough use of cryptography
FREE DOWNLOAD
WSN consists of hundreds or thousands of low-power nodes, that are able to sense real phenomena and communicate with each other. The data collected by the nodes is transferred to central device called Sink where sensor information are accumulated and

Introduction to Cryptography
FREE DOWNLOAD
Summary This article is the first in a series of articles, which plans to give the reader a bottoms-up introduction to the basics of e-security. The goal of this article is to introduce the reader to the basics of cryptography. Special emphasis will be given to the differences,

Topics in quantum cryptography, quantum error correction, and channel simulation
FREE DOWNLOAD
We prove a regularized formula for the secret keys assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity [25]. This formula

Comparative Study of Arithmetic and Huffman Data Compression Techniques for Koblitz Curve Cryptography
FREE DOWNLOAD
ABSTRACT Over the past 20 years, numerous papers have been written on various aspects of ECC implementation. In this paper we investigate the superiority of the Arithmetic data compression technique over the Huffman data compression technique in reducing the

Cryptography in Computer System Security J. UCS Special Issue
FREE DOWNLOAD
Cryptography plays an important role on ensuring the security and reliability of modern computer systems. Since high speed and broad bandwidth have been becoming the keywords for modern computer systems, new cryptographic methods and tools must follow

Secure antnet routing algorithm for scalable adhoc networks using elliptic curvecryptography
FREE DOWNLOAD
ABSTRACT The secure end-to-end route discovery in the decentralized Mobile Adhoc Networks (MANETs) should have to meet the requirements of prevention of DoS attacks on data traffic, should be adaptive and fault tolerant and must have high speed, low energy

New media for teaching applied cryptography and network security
FREE DOWNLOAD
Considering that security education needs to train students to deal with security problems in real environments, we developed new media for teaching applied cryptography and network security. They permit students to gain real-life security experience from virtual laboratories

Finding cryptography in object code
FREE DOWNLOAD
ABSTRACT Finding and identifying cryptography is a growing concern in the malware analysis community. In this paper, a heuristic method for determining the likelihood that a given function contains a cryptographic algorithm is discussed and the results of applying this

Halftone visual cryptography via direct binary search
FREE DOWNLOAD
ABSTRACT This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels encoded into shares introduce noise to the halftone images. We extend our

A Survey on cryptography and Steganography methods for information security
FREE DOWNLOAD
ABSTRACT This paper deals with the tidings of cryptography in history, how it has played a vital role in World War-1, World War-2. It also deals with the Substitution, Transposition Cryptographic techniques and Steganography principles which can be used to maintain

Joint screening halftoning and visual cryptography for image protection
FREE DOWNLOAD
Since digital right management of digital media data has received considerable attention recently, protection of halftone image documents becomes another important topic. Image- based visual cryptography is found to provide an alternative for applications of copyright

Cryptography: How to keep your secrets safe
FREE DOWNLOAD
Zack has decided to try out the online dating service Chix-n-Studz. com. He signs up for an account at the Web site and fills in several screens of forms detailing his personal profile and what he is looking for in a potential partner. In no time at all, the service offers him a

Real-Time Symmetric Cryptography using Quaternion Julia Set
FREE DOWNLOAD
Summary In this paper, Quaternion Julia set is used to generate real-time based symmetric keys for cryptography. The number of iterations, complex number and control value are the determining parameters of dynamically varying quaternion Julia image structure. The

Between Encrypt-and-MAC Composite (CMAC CTR) and Encrypt-then-MAC Composite (AES EAX) Modes of Operation in Cryptography Systems for Use in
FREE DOWNLOAD
ABSTRACT In current mobile telecommunications systems, the security offered by these networks are limited. In order to be used in use cases that require a high degree of security, such as M2M (financial, voting system), more security guarantees are necessary.

Fast Implementation of Elliptic Curve Cryptography and Pairing Computation for Sensor Networks
FREE DOWNLOAD
D Cmara, R Dahab , Curve Cryptography ( ,math.ucalgary.ca A WSN is an ad hoc network comprised of tiny and smart sensoring devices employed for cooperative monitoring tasks. The deployment of cryptography on sensor networks is a challenging task, given the limited computational power and the resource-constrained

Threshold visual cryptography scheme for color images with no pixel expansion
FREE DOWNLOAD
ABSTRACT Since the introduction of threshold visual cryptography by Naor and Shamir, there have been many other schemes proposed; some of them support color images with a limited number of color levels while a few others achieve the property of no pixel expansion.

Towards non-black-box lower bounds in cryptography
FREE DOWNLOAD
We consider average-case strengthenings of the traditional assumption that coNP is not contained in AM. Under these assumptions, we rule out generic and potentially non-black- box constructions of various cryptographic primitives (eg, one-way permutations, collision-

Free-space quantum cryptography in the H-alpha Fraunhofer window
FREE DOWNLOAD
ABSTRACT Free-space Quantum key distribution (QKD) has shown the potential for the practical production of cryptographic key for ultra-secure communications. The performance of any QKD system is ultimately limited by the signal to noise ratio on the single-photon

New Region Incrementing Visual Cryptography Scheme
FREE DOWNLOAD
ABSTRACT Recently, Wang introduced a novel (2, n) region incrementing visual cryptography scheme (RIVCS), which can gradually reconstruct visual secrets with multiple secrecy levels in a single image. A secret image is divided into multiple regions, where each region has

A Domain Specific Language for Cryptography
FREE DOWNLOAD
ABSTRACT In this paper, we propose a domain specific language for the development of hardware/software cryptographic systems based on the well known Python programming language. It is designed to allow a wide range of differentAbstraction levels, and to

Efficient Adders to Speedup Modular Multiplication for Cryptography
FREE DOWNLOAD
ABSTRACT Modular multiplication is an essential operation in many cryptography arithmetic operations. This work serves the modular multiplication algorithms focusing on improving their underlying binary adders. Different known adders have been considered and studied

Cryptography and shift registers
FREE DOWNLOAD
ABSTRACT Shift registers are at the heart of cryptography and error-correction. In cryptography they are the main tool for generating long pseudorandom binary sequences which can be used as keys for two communicating parties in symmetric cryptography. Practically all

Privacy-aware multi-context RFID infrastructure using public key cryptography
FREE DOWNLOAD
We propose a novel RFID infrastructure design, which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We show that an infrastructure for multi-purpose RFID tags to be used in different contexts can be implemented in a privacy-

Related

cryptography research papers-21

ultra wide band-uwb-11 CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER