cryptography IEEE PAPER 2017






Blockchain,cryptography , and consensus
free download

Page 1. Blockchain,cryptography , and consensus Christian Cachin (with Elli Androulaki, Angelo
De Caro, Andreas Kind, Mike Osborne, Simon Schubert, Alessandro Sorniotti, Marko Vukolic
and many more) IBM ResearchZurich June 2017 Page 2.Consensus Four elements characterize

Cryptographyusing DNA Nucleotides
free download

ABSTRACTCryptographyplays a key role in information security. Many new algorithms and techniques have been used in the same regards.Cryptographyusing DNA computing is very current state of the art. DNAcryptographycomes with the next level of data integrity and

Post-quantumcryptography -dealing with the fallout of physics success.
free download

AbstractCryptographyis essential for the security of Internet communication, cars, and implanted medical devices. However, many commonly used cryptosystems will be completely broken once big quantum computers exist. Post-quantumcryptographyis Abstract. Isogeny based post-quantumcryptographyis one of the most recent addition to the family of quantum resistant cryptosystems. In this paper we propose an efficient modular multiplication algorithm for primes of the form p= 2· 2 a 3 b− 1 with b even, typically used in

Methods for Protection of Key in Private KeyCryptography
free download

Abstract-The susceptible nature of information against forthcoming threats has become a ponderous affair for the professionals of this field. It is a result of the rational and steady struggle by the carrying people that has produced multiple approaches which shields vital

Intensify the security of One Time Password using Elliptic CurveCryptographywith Fingerprint for E-commerce Application
free download

Abstract: Security of one-time password (OTP) is crucial as a result of these days most of the e-commerce transactions are performed with the assistance of this mechanis m. OTP is employed to counter replay attack/eavesdropping. Replay attack or eavesdropping is o ne

Cryptographyin Cloud Computing: A Basic Approach to Ensure Security in Cloud
free download

Abstract: Cloud computing is an Internet-based computing model which provides several resources through Cloud Service Providers (CSP) to Cloud Users (CU) on demand basis without buying the underlying infrastructure and follows pay-per-use basis. It supports

Mutual Authentication Mechanism using Pre-Shared Key and BB84 Quantum Key Distribution for QuantumCryptographyCommunication
free download

Abstract. It is believed that the quantumcryptographybased on quantum key distribution achieves unconditional security. However, the additional authentication mechanism applied to the quantumcryptographyneeds to be studied since it is difficult for the quantum

Study onCryptographyand Techniques
free download

ABSTRACT In todays information age, communication play a very important role which help in growth of new technologies. So security is an essential parameter to be considered. A mechanism is therefore needed to secure the information that is sent. The process of

Profiles for the LightweightCryptographyStandardization Process
free download

Abstract This document describes the first two profiles for NISTs lightweightcryptography project. Profile I provides authenticated encryption with associated data (AEAD) and hashing functionalities for both hardware-oriented and software-oriented constrained environments.

A Review paper on Network Security andCryptography
free download

Abstract With the advent of the World Wide Web and the emergence of ecommerce applications and social networks, organizations across the world generate a large amount of data daily. Information security is the most extreme basic issue in guaranteeing safe

Implementation For Data Hiding Using VisualCryptography
free download

Abstract-Security and safety in each place need of protection, improvement. By this reason data transferring will secure and create need of improvement when transfer data every time. Visualcryptographywith boundary steganography represent GUI (Graphical User Interface)

A Novel Weighted VisualCryptographyScheme with High Visual Quality.
free download

Abstract VisualCryptography(VC) has been developed to encode a secret image into n shares for n participants in the past decades, in which each share is treated with the same priority. However, the privilege for participants in a group is not always the same. In this

Integrating the functional encryption and proxy re- cryptographyto secure drm scheme
free download

Abstract The current Digital Rights Management (DRM) systems use attribute-based encryption (ABE) and proxy re-encryption (PRE) to achieve fine-grained access control in cloud computing. However, these schemes have some limitations particularly in terms of

White-BoxCryptography : Dont Forget About Grey Box Attacks.
free download

Abstract. Despite the fact that all current scientific white-box approaches of standardized cryptographic primitives have been publicly broken, these attacks require knowledge of the internal data representation used by the implementation. In practice, the level of

A New Level 3 Trust Hierarchal Certificateless Public KeyCryptographyScheme in the Random Oracle Model.
free download

Abstract Despite the fact that the traditional public key infrastructure provides Level 3 trusted authority, but its two major problems of scalability and certificate management raised the need to an alternative security infrastructure. That motivated the appearance of new

A novel Mutual Authentication algorithm using visualcryptographywith novel visual cryptographic schemes
free download

Abstract-We proposed a mutual authentication scheme using visualcryptography . Traditionally text-based username and passwords are used to authenticate a user to any online service. Authentication using passwords are old as well as less reliable regarding

Secret Data Transmission Using Combination ofCryptographySteganography
free download

Abstract:-Secure communication is when two entities are communicating and do not want a third party to listen in. For that, they need to communicate in a way not susceptible to eavesdropping or interception. Two varieties of security mechanism,cryptographyand

Information TheoreticCryptographyfor Information Theorists (Notes for a tutorial at ISIT 2017)
free download

Randomness extraction refers to generating almost uniform bits as a function of a given random variable X. This will play a central role in all our applications, in particular, in the privacy amplification step of secret key agreement. The form of functions that can enable

A New VisualCryptographyApproach using Mosaic and Spread Spectrum Watermarking
free download

ABSTRACT Visualcryptographyis a furtive distribution scheme where a screte image is encrypted into the shares which independently make known no information concerning the secret original image. The attractiveness of the visual surreptitious distribution method is its

Colour BasedCryptography
free download

Abstract-In the increasing concern of the data security, most commonly method is encryption of messege to cipher text message, which are based on various strategies to encode. traditional method is to convert the message to cipher text by substitution, swapping,

Dual VisualCryptographyUsing the Interference Color of Birefringent Material
free download

Abstract Visualcryptographyis a method of encrypting an image into several encrypted images. Conventional visualcryptographycan display only monochrome images. We previously proposed a color visualcryptographymethod that uses the interference color of

ChaoticCryptography : Applications of Chaos Theory toCryptography
free download

Abstract In this paper, we discuss the history of ChaoticCryptography , and main definitions surrounding chaos theory. We then attempt to implement an encryption scheme based upon Baptistas original construction in 1998. We then discuss the possibility of using chaotic

Color VisualCryptographywith Stacking Order Dependence Using Interference Color
free download

Abstract Visualcryptographyis an encryption method that shares a secret image through several encrypted images. General visualcryptographyhas no stacking order dependence, and only one image can be decoded regardless of stacking order of encrypted images. We

Device independent quantumcryptographyfor finite samples
free download

Abstract Quantumcryptographypromises levels of security that are impossible to replicate in classical world. In all the initial quantum cryptographic protocols, the involving parties trust the measurement devices involved in the protocol. Later it is shown that the security of the

White Paper for Wacom:Cryptographyin the STU-541 Tablet
free download

This White Paper describes the new cryptographic security features designed into the STU 541 tablet and the benefits they bring. It is intended to be useful to anyone wanting to learn more about STU-541 cryptographic security, including those without a technical background,

Optimizing curve-basedcryptography
free download

Cryptographyhas a very long history and dates back to the time of the Roman Empire. Cryptographyenables a sender (often called Alice) to convert a message (plaintext) into a secret code (ciphertext) before sending to a receiver (often called Bob). Bob is able to

Video Piracy Detection Based on Audio Steganography, AES and DNACryptography
free download

Abstract: Data transmission in public communication system is prone to the interception and improper manipulation by eavesdropper. Audio Steganography is the procedure of hiding the existence of secret information by zipping it into another medium such as audio file. This

Symmetrically and Asymmetrically HardCryptography .
free download

Abstract The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memory complexity. For a variety of reasons, many algorithms have been proposed that, instead of optimizing, try to increase one of these hardness forms. We present for the

VisualCryptographyusing Image Thresholding
free download

Abstract-This paper proposes a novel visual cryptographic algorithm using image thresholding. The technique used simple image thresholding to generate a keyless scheme with a minimal computational load. The approach creates two shares of images from the

Lossless and Reversible Data Hiding in Image Encryption Using Public-KeyCryptography
free download

Abstract Encryption is the process of encoding a message or information in such a way that only authorized parties can access it. Encryption does not of itself prevent interference, but denies the intelligible content to a would-be interceptor. Encryption is important because it

DispersedCryptographyand the Quotient Ring Transform.
free download

Abstract This paper describes a radically different privacy, security and integrity solution. DispersedCryptographyconverts the cloud from a security threat into a security asset by combining a standard stream cipher and the Quotient Ring Transform (QRT). The result is an

A Refinement of Quantum Mechanics by Algorithmic Randomness and Its Application to QuantumCryptography
free download

Abstract: The notion of probability plays a crucial role in quantum mechanics. It appears in quantum mechanics as the Born rule. In modern mathematics which describes quantum mechanics, however, probability theory means nothing other than measure theory, and

Technique to Enhance Information Security Using Hybrid GeometricCryptography : A Review
free download

AbstractCryptographyis the science or art of transforming any data (plaintext) into one that is not understandable by unauthorized person (cipher text) and then transforming the message back to its original form (plaintext). Here, the information is encoded to some other Abstract. Addition chain calculations play a critical role in determining the efficiency of cryptosystems based on isogenies on elliptic curves. However, finding a minimal length addition chain is not easy; a generalized version of the problem, in which one must find a

A Secure VisualCryptographyScheme Using Private Key with Invariant Share Sizes
free download

Abstract Visualcryptography(VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visualcryptographyis splitting the secret image into

FPGA IMPLEMENTATION OF DES ALGORITHM USING DNACRYPTOGRAPHY .
free download

ABSTRACT DNACryptographyis the evolving cryptanalytic technology in the field of information security. Using this Cryptanalytic technology which involves in DNA Cryptographyimproves the security level to protect information from attackers. However all

TextCryptographyUsing Two Stage PasskeyRandom Text
free download

Abstract This work is designed to optimize the password used to securely transfer text data. This article reviews the previous techniques and presents an advanced approach to transforming data from isolated common data into encrypted complex data, but enhances

Implementation Paper on VisualCryptographyfor Sharing Digital Image Using Diverse Media
free download

Abstract As we know that todays era is working on very advance techniques with internet and traditional encryption techniques are just converting the readable images into some unreadable format ie cipher text format. This encrypted cipher text can be very conveniently

Cryptography : A Comparative Analysis for Modern Techniques
free download

AbstractCryptographyplays a vital role for ensuring secure communication between multiple entities. In many contemporary studies, researchers contributed towards identifying bestcryptographymechanisms in terms of their performance results. Selection of

A Novel DNA Sequence Approach for Network Intrusion Detection System Based onCryptographyEncoding Method
free download

Abstract A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to

Securing Portable Document Format File Using Extended VisualCryptographyto Protect Cloud Data Storage.
free download

Abstract With the vast development in cloud computing model, various organizations and individuals often deploy the cloud without reviewing the security policies and procedures which can cause great risk in their business. Securing data in cloud storage becomes a

SECURITY IN MANETS USINGCRYPTOGRAPHYALGORITHMS
free download

Abstract-Mobile Ad-hoc Network (MANET) is an important field where many of the users are using mobile devices for last few years where ad-hoc routing in networks is one of the prominent issues. A malicious node can drop the routing information, data packets

Large Integer Arithmetic in GPU forCryptography
free download

ABSTRACT Most computer nowadays support 32 bits or 64 bits of data type on various type of programming languages and they are sufficient for most use cases. However, in cryptography , the required range and precision are more than 64 bits which are

GLITCH: A Discrete Gaussian Testing Suite For Lattice-BasedCryptography
free download

Abstract: Lattice-basedcryptographyis one of the most promising areas within post-quantum cryptography , and offers versatile, efficient, and high performance security services. The aim of this paper is to verify the correctness of the discrete Gaussian sampling component, one

Improved Way to Enhance Information Security Using HybridCryptographyon WSN: A Research
free download

Abstract The popularity of Wireless Sensor Networks (WSN) has increased rapidly and tremendously due to the vast potential of the sensor networks to connect the physical world with the virtual world. Since sensor devices rely on battery power and node energy and may

Quantum-Elliptic curveCryptographyfor Multihop Communication in 5G Networks
free download

ABSTRACT The Internet of Things (IoT) depicts a giant network where everythingcan be interconnected through the communication network. The communication can be initiated between peoplepeople, people-things, and things-things. Meanwhile, the fifth generation

Cryptography : A Review
free download

Abstract--In todays Internet world security plays a very important role in securing data. After noticing constant reports of data theft and hacking, enhancing security of the data has become mandatory. Before a secure algorithm is proposed, it is necessary to review the

Secure Multicast Communication using RSA and DNACryptography
free download

ABSTRACT: Security in communications especially in group communication plays a major role in todays world and it has to be implemented properly with the help of an efficient and robust encryption and decryption methodology. In a Multicast communication the media

Survey on Public KeyCryptographyScheme for Securing Data in Cloud Computing
free download

Abstract Numerous advancements in the Information Technology (IT) require the proper security policy for the data storage and transfer among the cloud. With the increase in size of the data, the time required to handle the huge-size data is more. An assurance of security in

CRYPTOGRAPHYAND ERROR CORRECTION CODE FOR IRIS BIOMETRIC RECOGNITION SYSTEM
free download

Abstract: Digital image processing is the use of computer algorithms to perform image processing on digital images. As a subcategory or field of digital signal processing, digital image processing has many advantages over analog image processing. It allows a much

Cost-Aware Cut-and-Choose Games with Applications inCryptographyand Prefix-Free Codes.
free download

Abstract Cost-aware cut-and-choose game is a fundamental technique that has many cryptographic applications. Best existing solutions of this game assumed for simplicity that the number of challenges is publicly known. This paper considers an extension of this game

An Anti-phishing Framework Based on VisualCryptography
free download

Abstract-Due to immense use of internet, online attack has increased. Among that, phishing attack is the most common one. Phishing is an act carried by an individual or a group to access personal information such as credit card details, passwords etc for financial gain and

The Role of Mathematics in Emergence ofCryptography : A Review
free download

ABSTRACTCryptographyis an art of developing techniques of writing messages in a secret way and ensuring the security in communication. Earlier, the use ofcryptographywas restricted to the safety of information in diplomatic and military areas. With the growth in e-

Markov Chains: A Random Walk Through Particles,Cryptography , Websites, and Card Shuffling
free download

Abstract In this paper, I will discuss the origins of Markov chains, the theory behind them, and their convergent quality seen in the Ergodic theorem. From there, I will outline the Metropolis-Hastings algorithm, one of the most important applications of Markov chains, and

QR Code Resistant Key Logging Based VisualCryptography
free download

Abstract: The main aim here is to develop a combination of text and color QR Code based authentication mechanism passwords for session authentication instead of traditional textual passwords. Most existing methods have been subjected to lots of attacks. Even two factor

Game-basedcryptographyin HOL
free download

Abstract In this AFP entry, we show how to specify game-based cryptographic security notions and formally prove secure several cryptographic constructions from the literature using the CryptHOL framework. Among others, we formalise the notions of a random oracle,

Review on Network Security andCryptography
free download

ABSTRACT On the internet with the advent of world wide web, world generate a large amount of data daily. Data security is use for safe the information through the internet. Also network security issues are now becoming important as society is moving towards digital

Performance Analysis for IDBAS and LWSEACryptographyTechnique in Generic Bio-Inspired Cybersecurity in SIWC model for WSN
free download

ABSTRACT The expeditious advances of Information Technology (IT) and Communication Technology have led in various Cyber-Physical Systems (CPSs) such as smart traffic flow management, healthcare platforms, Internet of Things and computer networks. In current

Sybil Attack Prevention in WSN Using Elliptic CurveCryptographyand Genetic Algorithm
free download

Abstract: Wireless Sensor Network (WSN) is an evolving technology that is employed in numerous applications in real time fields including health, mass public, disaster detection and environmental monitoring. WSN contains a large number of sensor nodes to monitor AIT BasedCryptography
free download

Security for cryptographic systems is based on two main approaches: computational security and information-theoretic security. In the first approach on tries to design a system in such a way that an attacker can not feasibly break it within a reasonable amount of time. These are

A FINGERPRINT BIOMETRIC PRIVACY USING VISUALCRYPTOGRAPHY
free download

Abstract-Biometric authentication systems are gaining widespread popularity in recent years due to the advances in sensor technologies as well as improvements in the matching algorithms. Preserving the privacy of digital biometric data stored in a central database has

Sharper bounds in lattice-basedcryptographyusing the Rényi divergence
free download

Abstract. The Rényi divergence is a measure of divergence between distributions. It has recently found several applications in lattice-basedcryptography . The contribution of this paper is twofold. First, we give theoretic results which renders it more efficient and easier to

Advance Halftone Secure Secret Sharing Scheme with Error Diffusion Technique Along with Adaptive Secure Confidential Key in the VisualCryptography
free download

Abstract In the area of medicine, storing medical images of the patient in a very secure manner becomes to be toughest challenge. As the development in the digitalization of medicine, medical images security becomes critical issues for providing the secure

A Bibliography of Publications onCryptography : 1990 1999
free download

Nelson HF Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM b

A Complete Bibliography of Publications in Designs, Codes, andCryptography
free download

(0, 1) [628]. (0, 2) [962]. (0, 2,t) [637]. (0,α) [696,844]. (1, −1) [518]. (1, 2) [1269]. (17,9) [351]. (17q, 17, 2) [364]. (2) [1198]. (2, 2) [1179]. (2, 27) [1431]. (2,7) [1432]. (2, 8) [667,1133]. (2,n) [904]. (2,q) [1432]. (2,qn) [1231]. (255,k) [657]. (25q, 25, 3) [364]. (28, 12, 11) [117]. (2n)

Identity-basedcryptographywith Outsourced Revocation in Cloud Computing
free download

ABSTRACT Identity-Based Encryption (IBE), which make simple to the public key and credential management at Public Key Infrastructure (PKI) is a significant option to public key encryption. However, one of the most important competence drawbacks of IBE is the

The Advantages of Elliptic CurveCryptographyfor Security
free download

Abstract Elliptic CurveCryptographyhas been a recent research area in the field of Cryptography . It provides higher level of security with lesser key size compared to other Cryptographic techniques. This paper provides an overview of ellipticcurves and their use in

Hyperchaos basedCryptography : New Seven Dimensional Systems to Secure Communications
free download

ABSTRACT The growth of technology and the emphasis on privacy have intensified the need to find a fast and secure cryptographic method. As chaotic signals are usually noise like and chaotic systems are very sensitive to the initial condition, they can be used in

LPN inCryptography : an Algorithmic Study
free download

Abstract The security of public-keycryptographyrelies on well-studied hard problems, problems for which we do not have efficient algorithms. Factorization and discrete logarithm are the two most known and used hard problems. Unfortunately, they can be easily solved

POST-QUANTUMCRYPTOGRAPHYWITH QUASI-CYCLIC MODERATE-DENSITY PARITY-CHECK CODES
free download

The purpose of this thesis is to examine if Quasi-Cyclic Moderate-Density Parity-Check (QC MDPC) codes is a good family of error-correcting codes to replace the family of Goppa codes in the McEliece cryptosystem. This cryptosystem is one of a few cryptosystems which

A Survey on ACO andCryptographyTechniques for Cloud Computing Security and Privacy
free download

Abstract Cloud computing is a technology evolution of adoption of virtualization, service oriented architecture and utility computing over the internet including applications, platform and services. Cloud security and privacy is a biggest concern about cloud computing,

Transfer of Data with Secured Methods like Image Elliptic CurveCryptographyand Steganography
free download

Abstract: Securing information is a testing issue in todays time. Remembering it we have proposed another procedure which is the mix of EllipticCryptographyand picture Steganography improved with another safe component for era of another, hearty security

Application of differentialcryptographyto a GN authentication hierarchy scheme
free download

Abstract. Starting from the classical differentialcryptography , we describe how to construct particular parameters for elliptic curves with application to the domain of information security. These results conclude to a key used on symmetrical encryption. The article will review a

Analysis of Post-QuantumCryptographyUse in Practice
free download

A Gagnidze, M Iavich, G Iashvili - Bull. Georg. Natl. Acad. Sci, 2017 - science.org.ge ABSTRACT. Quantum computers are able to destroy most, if not absolutely all conventional cryptosystems that are widely used in practice, specifically, systems based on the problem of factoring integers (eg, RSA). Some cryptosystems like RSA system with 4 000-bit keys are

Crafting Certified Elliptic CurveCryptographyImplementations in Coq
free download

Abstract Elliptic curvecryptographyhas become a de-facto standard for protecting the privacy and integrity of internet communications. To minimize the operational cost and enable near-universal adoption, increasingly sophisticated implementation techniques have

A comprehensive investigation of visualcryptographyand its role in secure communications.
free download

Abstract: Secret sharing approach and in particular VisualCryptography(VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing incryptography . VC takes an image (secret)

An investigation of visualcryptographyand its applications in secure communications
free download

Abstract Secret sharing approach and in particular VisualCryptography(VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing incryptography . VC takes an image (secret)

IMPLEMENTATION OF HASH FUNCTION FORCRYPTOGRAPHY(RSA SECURITY)
free download

ABSTRACT: In this thesis, a new method for implementing cryptographic hash functions is proposed. This method seeks to improve the speed of the hash function particularly when a large set of messages with similar blocks such as documents with common Headers are to

CRYPTOGRAPHYIN CREATIVE MEDIA
free download

ABSTRACT This paper argues the value of a creative approach to encryption. The first part of the text includes a survey of historical and modern examples of encryption in art, writing, and music to demonstrate the merit and purpose ofcryptographyin creative media. The

MODIFICATION AFFINE CIPHERS ALGORITHM FORCRYPTOGRAPHYPASSWORD
free download

ABSTRACT Computers as a means of storing and transmitting data, information, and confidential documents are important and can often be easily accessed by people who are not responsible. Security and confidentiality of data on computer networks today become a

Secured Mobile Biometric Authentication using (2, 2) VisualCryptography
free download

Abstract-Biometrics is the measurement and statistical analysis of peoples physical and behavioural Characteristics. Biometrics deals with automated method of identifying a person or verifying the identity of a person based on the physiological or behavioral characteristic, Generating elliptic curves forcryptography
free download

Abstract. Elliptic curvecryptography(ECC)[1, 2] is a very efficient technology for implementing public key cryptosystems and public key infrastructures (PKI), it offers encryption/decryption, digital signature, and key exchange solutions. During the last decade,

ASurvey ON RECENT APPROACHES COMBININGCRYPTOGRAPHYAND STEGANOGRAPHY
free download

ABSTRACT Digital communication witnesses a noticeable and continuous development in many applications in the Internet. Hence, a secure communication sessions must be provided. The security of data transmitted across a global network has turned into a key

XOR OPERATED VISUALCRYPTOGRAPHY
free download

Abstract: VisualCryptographyis a method for protecting image-based secrets that has a computation-free decoding process. In this paper, we describe a method which can be used to share an image with at least 256 colours into two meaningful cover images. We use a

A Short Survey of VisualCryptographyand Secret Image Sharing Techniques and Applications
free download

Abstract:Cryptography , in general, is a process of transforming original information into a format such that it is only read by the desired recipient. Visualcryptography(VC) scheme is a cryptographic technique which allows visual information to be encrypted in such a way that

ELLIPTIC CURVES ANDCRYPTOGRAPHY
free download

The history ofcryptographyis long and interesting. It had a very considerable turning point when two researchers from Stanford, Whitfield Diffie and Martin Hellman, published the paperNew Directions inCryptographyin 1976. They preface the new idea of public key

On the Computation of Reed-Muller Spectra forCryptographyand Switching Theory Applications
free download

Abstract We survey a variety of methods that allow for the Reed-Muller spectrum, also known as the Algebraic Normal Form (ANF), to be computed for functions of a large number of variables. Some of the methods are previously known while others may be new to the

Progressive VisualCryptographywith Friendly and Size Invariant Shares
free download

Abstract: Visualcryptographyis an important data encoding method, where a secret image is encoded into n pieces of noiselike shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human naked eye; this cannot

Secure Mobile Payment System Using SymmetricCryptographyin Ethiopia
free download

Abstract Mobile payment allows users to perform payment transactions through their mobile phones. However, security issues are by far the greatest deterring factors that limit the popularity of this payment system. The problem is lack of sufficient security mechanisms with

IMPLEMENTATION ON DATA HIDINGCRYPTOGRAPHYBY USING DIFFERENT SECURITY ALGORITHMS WITH USER AUTHENTICATION
free download

ABSTRACT In this paper, data hiding a form of steganography orcryptographyembeds data into digital media for the purpose of identification, annotation, and copyright. In this paper, various type of data such as text, image, audio, video, and documents hide by using different

A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic CurveCryptographyand TDMRC
free download

Abstract e are in the era of digital revolution and the benefits are remarkable. People are much dependent on digital technology and cant survive without it. With the advancement of Internet and its applications, we share a wide range of data including texts, images, audios

An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic CurveCryptographyfor RFID, Proven on WISP
free download

Abstract. Information in patients medical histories is subject to various security and privacy concerns. Meanwhile, any modification or error in a patients medical data may cause serious or even fatal harm. To protect and transfer this valuable and sensitive information in

Cognitive Processing ofCryptographyConcepts: An fMRI Study
free download

Abstract This study investigated the effects of using Model Eliciting Activities that build representational fluency on the cognitive processing of selectedcryptographyconcepts. The study used an experimental design where in the control group thecryptographyconcepts

A Simple Chaotic ImageCryptographyAlgorithm Based on New Quadratic Chaotic Map
free download

Abstract The chaos based cryptographic methods have been suggested some new and efficient algorithms to develop image encryption techniques because of its exceptionally desirable properties of sensitivity to initial condition and parameters of chaotic map.

ANew XOR-BASED VISUALCRYPTOGRAPHYSCHEME FOR AUTHENTIC REMOTE VOTING SYSTEM
free download

ABSTRACT The current technological era demands high security and verifiability, especially in the Remote Voting System (RVS) through the Internet in order to resist the cheating case in election process. In this paper, a new VisualCryptography(VC) scheme is proposed to Post quantumcryptography
free download

Abstract. A quantum computer with Shors algorithm will solve the integer factorization and the discrete logarithm problems upon which most of the widely used cryptosystems such as RSA (Rivest, Shamir, Adleman) and ECC (elliptic curvecryptography ) are based. This year was marked by the fifth edition of the International Workshop on Lightweight Cryptographyfor Security and Privacy (LightSec). With the increasing deployment of ubiquitous systems and pervasive computing, the field of low-resourcecryptographyis

Combinatorial Optimization inCryptography
free download

Abstract The known attacks on different cryptosystems lead to a number of criteria that the implemented cryptographic algorithms (ciphers) must satisfy. The design of cryptographic systems needs to consider various characteristics simultaneously, which can be regarded as

CryptographySystem for Information Security Using Chaos Arnolds Cat Map Function
free download

Abstract. This study aims to apply the Chaos Theory incryptography . Chaos theory is a very complex, irregular and random behavior in a deterministic system. Chaos has a random nature, a slight change of course will generate different numbers, and it is useful in


- -

FREE IEEE PAPER