cryptography-research-papers-2012-section 3







On a matrix product question in cryptography
free download

On a matrix product question in cryptography  Let A, B be invertible n × n matrices with irreducible characteristic

Performance of Error Filters on Shares in Halftone Visual Cryptography via Error Diffusion
free download

ABSTRACT Visual cryptography encodes a secret binary image (SI) into shares of random binary patterns. The decoding process of a visual cryptography scheme, which differs from traditional secret sharing, does not need any cryptographic algorithms like symmetric and

Discrete logarithms in Cryptography
free download

Bob wants to send a message m to Alice. Alice has choosen (or has been given) a large prime p and an integer g with large (prime) order modulo p. Alice publishes these numbers (for example on her homepage) and describes how Bob can send her a secure message.

A Survey on the Applications of Cryptography
free download

 352 A Survey on the Applications of Cryptography Shivangi Goyal University School Of Information Technology Guru Gobind Singh Indraprastha University 16-C, Dwarka, Delhi  This paper gives a brief summary of cryptography, where it is applied and its usage in various forms.

Effective Key Authentication for IEEE 802. 11 Networks using Quantum Cryptography
free download

ABSTRACT Wireless networks are growing tremendously and their applications are also becoming prominent from day to day [5]. As wireless applications are becoming popular, the security issues [3] related to 802.11 are also has a great consideration. These are gaining

Lattice Based Tools in Cryptanalysis for Public Key Cryptography
free download

ABSTRACT. Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Lattice reduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence of lattice based cryptosystems of hard in nature,

Fast and compact elliptic-curve cryptography
free download

ABSTRACT Elliptic curve cryptosystems have improved greatly in speed over the past few years. Here we outline a new elliptic curve signature and key agreement implementation which achieves record speeds while remaining relatively compact. For example, on Intel

On the Cryptanalysis of Public-Key Cryptography
free download

ABSTRACT Nowadays, the most popular public-key cryptosystems are based on either the integer factorization or the discrete logarithm problem. The feasibility of solving these mathematical problems in practice are studied and techniques are presented to speed-up

Cryptography Based E-Commerce Security: A Review
free download

ABSTRACT E-commerce is a powerful tool for business transformation that allows companies to enhance their supply-chain operation, reach new markets, and improve services for customers as well as for providers. Implementing the E-commerce

IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
free download

ABSTRACT Visual cryptography encodes a secret binary image (SI) into shares of random binary patterns. If the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret

A Discussion on Elliptic Curve Cryptography and Its Applications
free download

ABSTRACT Elliptic curve cryptography (ECC) is a kind of public key cryptosystem like RSA. But it differs from RSA in its quicker evolving capacity and by providing attractive and alternative way to researchers of cryptographic algorithm. The security level which is given by RSA

Block Based Symmetry Key Visual Cryptography
free download

ABSTRACT Visual cryptography is a method for protecting image-based secrets that has a computationfree decoding process. In this technique, numbers of shares have been generated from one image. The shares are sent through any channel to the receiver and

A Technique to Speed up the Modular Multiplicative Inversion over GF (P) Applicable to Elliptic Curve Cryptography
free download

ABSTRACT This paper presents a technique to speed up the computation of inversion of NIST recommended elliptic curve with modulus p521-1. The property of multiplicative inverse between pair of numbers over Meresenne? s prime is used to reduce the number

Provable Security in Symmetric Key Cryptography
free download

1. At the point when TL is queried, B, L, R are fixed 2. B, L, R uniquely determine BL, and B? S 3. The number of BR-queries (B, L|| R, S) such that B? S= B? S is at most a except with small probability 4. Each of BR-queries uniquely determines TR, and A? R 5. The

Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware
free download

In recent years lattice-based cryptography has emerged as quantum secure and theoretically elegant alternative to classical cryptographic schemes (like ECC or RSA). In addition to that, lattices are a versatile tool and play an important role in the development

Speech Signal Encryption Using Chaotic Symmetric Cryptography
free download

ABSTRACT With development of Information and Communication Technology, data transmission becomes more critical day by day. Higher security for transmitting data is especially required. Therefore, we propose an encryption scheme for the speech signal

Novel Security Scheme for Image Steganography using Cryptography Technique
free download

ABSTRACT In today s information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. Cryptography and Steganography are the two major techniques

Network based Security model using Symmetric Key Cryptography (AES 256–Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key
free download

Summary The main aim of this paper is to strengthen secured communication over the Network by enhancing the strength of the AES algorithm with Diffie-Hellman key exchange Protocol. The Rijndael is a block cipher with variable block and key size is believed to

Cryptography and State-of-the-art Techniques
free download

Abstract Cryptography is an indispensable tool for protecting information in computer systems. Modern cryptography has strong relation with various disciplines like mathematics, computer science and electrical engineering along with data security. There are

Anonymity and Privacy in Public Key Cryptography
free download

ABSTRACT The Internet has become an essential part of our daily lives. However, various agents collect information about us giving rise to a plethora of privacy concerns. This thesis aims to guard the privacy of users by providing them anonymity in their online

Combining perspective and color visual cryptography for securing color image display
free download

ABSTRACT In this work, we propose to extend the secure information display introduced by Yamamoto et al.[1] to full color images. Yamamoto technique makes use of black and transparent mask as decoding shadow image of a visual cryptography scheme sharing 3

Performance Enhanced Co-Processor for Elliptic Curve Cryptography over GF (p)
free download

ABSTRACT In this paper an elliptic curve cryptographic (ECC) processor based on parallel mode operations over prime field cryptosystem GF (p) is developed. This vivid architecture employs linear feedback shift register (LFSR) as a data selector with very long recurrence

Related



- -

FREE IEEE PAPER