cryptography research papers 2011
Endomorphisms for faster elliptic curve cryptography on a large class of curves
free download
Abstract Efficiently computable homomorphisms allow elliptic curve point multiplication to be
accelerated using the Gallant–Lambert–Vanstone (GLV) method. Iijima, Matsuo, Chao and
Tsujii gave such homomorphisms for a large class of elliptic curves by working over. We
Position-based quantum cryptography: Impossibility and constructions
free download
The aim of position-based cryptography is to use the geographical position of a party as its
only credential. In this work, we study position-based cryptography in the quantum setting.
We show that if collaborating adversaries are allowed to pre-share an arbitrarily large
Securing peer-to-peer mobile communications using public key cryptography: New security strategy
free download
Mobile phones are considered to be the most common communication devices in history.
Recently, mobile phones are not only used for casual greetings but also, sending and
receiving important data such as, social security numbers, bank account details and
Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation
free download
It has been recently shown that sharing a common coordinate in elliptic curve cryptography
implementations improves the performance of scalar multiplication. This paper presents new
formulæ for elliptic curves over prime fields that provide efficient point addition and
Cryptography with tamperable and leaky memory
free download
A large and growing body of research has sought to secure cryptographic systems against
physical attacks. Motivated by a large variety of real-world physical attacks on memory, an
important line of work was initiated by Akavia, Goldwasser, and Vaikuntanathan [1] where
Visual cryptography for biometric privacy
free download
Abstract—Preserving the privacy of digital biometric data (eg, face images) stored in a
central database has become of paramount importance. This work explores the possibility of
using visual cryptography for imparting privacy to biometric data such as fingerprint
Leakage-resilient cryptography from the inner-product extractor
free download
S Dziembowski, S Faust ,Advances in Cryptology–ASIACRYPT 2011, 2011 ,Springer
We present a generic method to secure various widely-used cryptosystems against arbitrary
side-channel leakage, as long as the leakage adheres three restrictions: first, it is bounded
per observation but in total can be arbitrary large. Second, memory parts leak
Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking
free download
Abstract Visual Cryptography is a special type of encryption technique to obscure image-
based secret information which can be decrypted by Human Visual System (HVS). This
cryptographic system encrypts the secret image by dividing it into n number of shares and
Solving circuit optimisation problems in cryptography and cryptanalysis
free download
NT Courtois, D Hulme, T Mourouzis ,2011 ,satalia.com
Abstract. One of the hardest problems in Modern heuristic techniques for combinatorial problems. Advanced topics in computer science
free download
Decision Tree and Ensemble Learning Based on Ant Colony Optimization Google Books Result Modern heuristic techniques for combinatorial problems . Faculty library sciences Series: Advanced topics in computer science series; Alternative call (PDF) Modern Heuristic Search Methods
Software Agents Michael R. Genesereth Logic Group Computer Science Department Stanford University
free download
The software world is one of great richness and diversity. Many thousands of software products are available to users today, providing a wide variety of information and services in a wide variety of domains. While most of these programs provide their users with significant Classical complexity theory analyzes and classifies problems by the amount of a resource, usually time or space, that is required by algorithms solving them. It was a fundamental idea, going back to the work of Hartmanis and Stearns in the early 1960s, to measure the required
The combinatorics of network reliability, International Series of Monographs on Computer Science
free download
This book develops combinatorial tools which are useful for reliability analysis, as demonstrated with a probabilistic network model. Basic results in combinatorial enumeration are reviewed, along with classical theorems on connectivity and cutsets. More developed
Languages and machines: an introduction to the theory of computer science
free download
Languages and machines : an introduction to the theory of computer . Theory of Computing 2015/2016 (FUB MSc in Computer Science ) Languages and Machines, which is intended for computer scientists in the theoretical foundations of their subject, gives a mathematically sound In the late 1960s and early 1970s, the concepts of graph transformation and graph grammars started to become of interest in picture processing and computer science . The main idea was to generalize well-known rewriting techniques from strings and trees to Parsing is the process of structuring a linear representation in accordance with a given grammar. This definition has been kept abstract on purpose to allow as wide an interpretation as possible. The linear representation may be a sentence, a computer
The Cambridge distributed computing system. International computer science series
free download
The Development of Component-based Information Systems Google Books Result The Cambridge Distributed Computing System is an early discontinued distributed operating system, . (International computer science series) Bibliography: p. The 100 Best Computer Science Programs in the
Logic and the challenge of computer science
free download
Nowadays computer science is surpassing mathematics as the primary field of logic applications, but logic is not tuned properly to the new role. In particular, classical logic is preoccupied mostly with infinite static structures whereas many objects of interest in
Computer science unplugged
free download
For kids ages 7 to 14: This educational 50 minute show is an action-packed, zany time exploring neat ideas in computer science . It has been performed for over 20 years in classrooms, science museums, science festivals, and at educational events. Kids, and the
The Profession of IT, Is Computer Science Science
free download
COMMUNICATIONS OF THE ACM draw on the same fundamental principles. In 1989, we used the term computing instead of computer science , mathematics, and engineering. Today, computing science, engineering, mathematics, art
Discrete mathematical structures with applications to computer science
free download
The objectives of the course are: To develop Professional Skills through effective communication To introduce a number of Mathematical Foundation to be serving as tools even today in the development of theoretical computer science To gain some confidence on
Bringing computational thinking to K-12: what is Involved and what is the role of the computer science education community
free download
When Jeanette Wing [13] launched a discussion regarding the role of computational thinking across all disciplines, she ignited a profound engagement with the core questions of what computer science is and what it might contribute to solving problems across the
Modern DC-to-DC Switchmode Power Converter Circuits (Van Nostrand Reinhold Electrical/ Computer Science and Engineering Series)
free download
As each area of technology with a potential for significantly impacting any major segment of the electronics industry evolves, it often is accompanied by the development of a succession of new circuits. Each new circuit indeed appears different, employing different components
Information technology research: A practical guide for computer science and informatics
free download
Information Technology Research: A Practical Guide for Computer
Scientific methods in computer science
free download
ABSTRACT This paper analyzes scientific aspects of Computer Science . First it defines science and scientific method in
Active learning and its use in computer science
free download
Student learning and the depth of the students knowledge increase when active learning methods are employed in the classroom. Active learning strategies are discussed in general computer science course work and as used in a theory of computation course. Difficulties
Why the high attrition rate for computer science students: some thoughts and observations
free download
1. Introduction At our university, there are over four hundred declared majors in Computer Science . Each semester, however, only about fifteen to twenty students graduate in this field. The freshman courses comprise overflowing multiple sections, but the upper level courses make
Form and content in computer science
free download
The trouble with computer science today is an obsessive concern with form instead of content. No, that is the wrong way to begin. By any previous standard the vitality of computer science is enormous; what other intellectual area ever advanced so far in twenty years
Why women avoid computer science
free download
COMMUNICATIONS OF THE ACM did these numbers drop, and why more sharply for women than for men For men, the explanation is obvious. Traditional paths to wealth like law, medicine, and business are more certain, and over the
is the problem of gate-efficient
implementation. Such optimizations are particularly important in industrial hardware
implementations of standard cryptographic algorithms . In this paper we
Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
free download
Abstract. Multi-precision multiplication is one of the most fundamental operations on
microprocessors to allow public-key cryptography such as RSA and Elliptic Curve
Cryptography (ECC). In this paper, we present a novel multiplication technique that
Curves, Codes, and Cryptography
free download
Extension of the statement in Chapter 8 of this thesis 1000-bit security is far away from
having any real-world relevance. Even going beyond our world doesn’t help. There are
fewer atoms in the observable universe; a rough estimate is 2265.
An application of discrete algorithms in asymmetric cryptography
free download
F Amounas, EH El Kinani, A Chillali ,International Mathematical , 2011 ,m-hikari.com
Abstract In this paper we propose an application of public key distribution based on the
security depending on the difficulty of elliptic curve discrete logarithm problem. More
precisely, we propose an example of Elgamal encryption cryptosystem on the elliptic
Comparative Study of Arithmetic and Huffman Data Compression Techniques for Koblitz Curve Cryptography
free download
S Rao ,International Journal of Computer Applications, 2011
Abstract Over the past 20 years, numerous papers have been written on various aspects of
ECC implementation. In this paper we investigate the superiority of the Arithmetic data
compression technique over the Huffman data compression technique in reducing the
Cryptography goes to the Cloud
free download
In this paper we identify some areas where cryptography can help a rapid adoption of cloud
computing. Although secure storage has already captured the attention of many cloud
providers, offering a higher level of protection for their customer’s data, we think that more
Some notions of entropy for cryptography
free download
This paper presents a brief and (necessarily) incomplete survey of some notions of entropy
that have been recently used in the analysis of cryptographic constructions. It focuses on min-
entropy and its extensions to the cases when the adversary has correlated information
Fault Attack and Countermeasures on Pairing-Based Cryptography
free download
Abstract Bilinear pairing is a new and increasingly popular way of constructing cryptographic
protocols. This has resulted in the development of Identity Based Encryption (IBE) that is
ideally used in identity aware devices. The security of such devices using pairing
Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags
free download
C Hocquet, D Kamel, F Regazzoni, JD Legat ,Journal of Cryptographic , 2011 ,Springer
Abstract An important challenge associated with the current massive deployment of Radio
Frequency Identification solutions is to provide security to passive tags while meeting their
micro Watt power budget. This can either be achieved by designing new lightweight
Cryptography for efficiency: Authenticated data structures based on lattices and parallel online memory checking
free download
Abstract. In this work, we initially design a new authenticated data structure for a dynamic
table with n entries. We present the first dynamic authenticated table that is update-optimal,
using a lattice-based construction. In particular, the update complexity is O (1), improving
Utilizing hard cores of modern FPGA devices for high-performance cryptography
free download
T Güneysu ,Journal of Cryptographic Engineering, 2011 ,Springer
Abstract This article presents a unique design approach for the implementation of
standardized symmetric and asymmetric cryptosystems on modern FPGA devices. In
contrast to many other FPGA implementations that algorithmically optimize the
Meaningful shadow based multiple gray level visual cryptography without size expansion
free download
PY Pai, CC Chang, YK Chan, CC Liao ,International Journal of Innovative , 2011 ,ijicic.org
Abstract. In traditional visual cryptographic methods, a reconstructed secret image is usually
at a binary gray level and is expanded in size, and the created shadow images often appear
meaningless and noise-like. This paper will provide a meaningful shadow based multiple
Dedicated hardware for RC5 cryptography and its implementation
free download
M Yoshikawa, K Sakaue ,World Congress in Computer Science, Computer ,cerc.wvu.edu
Abstract–Recently, the number of electronic devices handling confidential information has
increased. In these devices, encryption is applied to protect the confidential information.
Therefore, technologies to incorporate cryptographic circuits into these cards have
Software Implementation of Curve based Cryptography for Constrained Devices
free download
K Chatterjee, A De, D Gupta ,International Journal of Computer , 2011
ABSTRACT Curve based cryptography are preferred for embedded hardware since they
require shorter operand size than RSA to attain the same security level. So ECC and HECC
are more suitable in constrained environment such as smart cards if we can select
Survey: Image Encryption using Chaotic Cryptography Schemes
free download
M Philip, A Das ,IJCA-Computational Science NCCSE, 2011
ABSTRACT Chaotic Encryption Method seems to be much better than traditional encryption
methods used today. Chaotic encryption is the new direction of cryptography. It makes use of
chaotic system properties such as sensitive to initial condition and loss of information.
CSE PROJECTS