cryptography ieee paper 2019

Notes on Primality Testing And Public Key Cryptography Part 1: Randomized Algorithms Miller Rabin and Solovay Strassen Tests
free download

Prime numbers have fascinated mathematicians and more generally curious minds for thousands of years. What is a prime number Well, 2, 3, 5, 7, 11, 13,, 9973 are prime numbers. The defining property of a prime number p is that it is a positive integer p≥ 2 that

Genus two isogeny cryptography
free download

We study (l, l)-isogeny graphs of principally polarised super singular abelian surfaces (PPSSAS). The (l, l)-isogeny graph has cycles of small length that can be used to break the collision resistance assumption of the genus two isogeny hash function suggested by

Generalized Visual Cryptography Scheme with Completely Random Shares
free download

ABSTRACT A modification of the standard Naor-Shamir scheme for visual cryptography and visual secret sharing is proposed. Better statistical properties of shares are obtained at the cost of the slightly worse quality of reconstructed images. Advantages and disadvantages of

A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages
free download

Steganography and cryptography are very important techniques used in data security to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography
free download

With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms

Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process
free download

Abstract The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public competition-like process. The new publickey cryptography standards will specify one or more additional digital

ID-Based Cryptography and Remote Data Checking for Secure Cloud Data Storage
free download

The massive technological advancements in world exchange and the necessity for individual information to cross global outskirts featured the need to characterize security arrangements and propose unequivocal controls to upgrade the insurance of natives up

Semiring Actions for Public Key Cryptography
free download

Novel and Efficient Visual Cryptography scheme for privacy protection
free download

Both the hashing and the encryption / decryption keys are generated from the user claimed ID, using a modified password-based key driven algorithm. Askari, N., et. al (2012, April). In this paper, a novel visual secret sharing scheme is proposed without image size expansion The Conference on Selected Areas in Cryptography (SAC) is the leading Canadian venue for the presentation and publication of cryptographic research, and has been held annually since 1994. SAC celebrated its 25th anniversary in 2018, taking place for the second time at

Visual Cryptography using half toned images
free download

With an exponentially increasing pile of information dumped across the World Wide Web, securing private and public information has never been more imperative. Over the years, encryption techniques have evolved to include many steps with multiple calculations The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general

A study on Role and Applications of Cryptography Techniques in Cloud Computing (Cloud Cryptography )
free download

Cloud Computing refers to controlling, arranging, and getting to the equipment and programming assets remotely. It offers online data storage, infrastructure, and applications. Cloud Computing gives customers a virtual computing environment on which they can store

free download

The mapping or strap of IP addresses to host names became a major problem in the rapidly growing Internet and the higher level binding effort went through different stages of development up to the currently used Domain Name System (DNS). The DNS Security is

RD Trends and Future Prospects of Quantum Cryptography
free download

2. Quantum cryptography Cryptosystems based on mathematical algorithms such as RSA and elliptic curve cryptography are currently in widespread use throughout society. But although they are extremely easy to use, they are at risk of being broken by future

free download

This paper discusses about how cryptography is misused in the security design of a large part of the Web. The web application framework developed by Microsoft powers 25% of all Internet web sites. The attackers can abuse multiple cryptographic design flaws to

Hardware Components for Post-Quantum Elliptic Curves Cryptography
free download

Investigations in the sphere of quantum calculations form up new challenges in the public key cryptography . Currently known public key crypto algorithms may be compromised with the implementation of quantum computers. The workgroups of ETSI and NIST determined

cryptography ieee paper 2019 IEEE PAPER