research paper and project in cryptography-13

research paper and project in cryptography-13

Towards generating secure keys for braid cryptography
ABSTRACT Braid cryptosystem was proposed in CRYPTO 2000 as an alternate public-key cryptosystem. The security of this system is based upon the conjugacy problem in braid groups. Since then, there have been several attempts to break the braid cryptosystem by

The evolutionary design of trace form bent functions in cryptography
Based on the trace representation of Boolean functions, we devise an evolutionary algorithm to design bent functions. Using this algorithm, we then construct many bent functions and perform some analyses. First, we observe that each of the four affinely inequivalent bent

Visual cryptography for face privacy
ABSTRACT We discuss the problem of preserving the privacy of a digital face image stored in a central database. In the proposed scheme, a private face image is dithered into two host face images such that it can be revealed only when both host images are simultaneously

Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptographyusing Koblitz s Method
ABSTRACT Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller bit size, thereby reducing processing overhead. ECC is ideal for constrained environment

Position-based quantum cryptography: Impossibility and constructions
The aim of position-based cryptography is to use the geographical position of a party as its only credential. In this work, we study position-based cryptography in the quantum setting. We show that if collaborating adversaries are allowed to pre-share an arbitrarily large

Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation
FREE DOWNLOAD It has been recently shown that sharing a common coordinate in elliptic curve cryptography implementations improves the performance of scalar multiplication. This paper presents new formulæ for elliptic curves over prime fields that provide efficient point addition and

Neural Cryptography with Multiple Transfers Functions and Multiple Learning Rule
ABSTRACT The goal of any cryptographic system is the exchange of information among the intended users. We can generate a common secret key using neural networks and cryptography. In the case of neural cryptography is based on a competition between

Constructive and destructive use of compilers in elliptic curve cryptography
ABSTRACT Although cryptographic software implementation is often performed by expert programmers, the range of performance and security driven options, as well as more mundane software engineering issues, still make it a challenge. The use of domain

Efficient software-implementation of finite fields with applications to cryptography
FREE DOWNLOAD ABSTRACT In this work, we present a survey of efficient techniques for software implementation of finite field arithmetic especially suitable for cryptographic applications. We discuss different algorithms for three types of finite fields and their special versions popularly used

Data confidentiality: to which extent cryptography and secured hardware can help
ABSTRACT Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is performed on the server, relying on the assumption that the server is a

A multiple watermarking technique for images based on visual cryptography
ABSTRACT With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the multimedia. In this paper, an invisible watermarking technique is proposed, to embed multiple binary watermarks into digital

Survey of visual cryptography schemes
ABSTRACT Visual cryptography scheme is a cryptographic technique which allows visual information (eg printed text, handwritten notes, and picture) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of

Secure localization using Elliptic Curve Cryptography in wireless sensor networks
Summary The crucial problem in Wireless Sensor Networks (WSNs) is position estimation or Localization, due to their dynamic method of deployment. There are several methods in determining their physical locations but the greatest challenge imposed is in

Single-photon counting in the 1550-nm wavelength region for quantum cryptography
FREE DOWNLOAD After the concept of quantum cryptography was announced for the first time by Stephen Wiesner in 1970, full-scale research began by C. Bennett of IBMs in 1979 [1–3]. Many research groups working on quantum cryptography technologies have made significant

A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment
ABSTRACT In today? s era of the ubiquitous computing, the Internet has become the main mode of data communication. Most of the devices used in wireless/mobile environments, that form wireless networks, ad-hoc networks and wireless sensor networks etc., have low

Combined phase-time encoding method in quantum cryptography
FREE DOWNLOAD ABSTRACT A new combined phase-time encoding method is proposed for fiber optic quantum cryptography systems. Preliminary estimates are given for the probability of the critical error to which cryptographic key distribution is possible.

Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller
FREE DOWNLOAD The software implementation of cryptographic schemes for wireless sensor networks poses a challenge due to the limited capabilites of the platform. Nevertheless, its feasibility has been shown in recent papers. In this work we describe a software implementation of

Steganalysis in the presence of weak cryptography and encoding
FREE DOWNLOAD Steganography is often combined with cryptographic mechanisms. This enhances steganography by valuable properties that are originally left to cryptographic systems. However, new problems for cryptographic mechanisms arise from the context of

Pseudo-Random Bit Generation based on 2D chaotic maps of logistic type and its Applications in Chaotic Cryptography
Pseudo-Random Bit Generation (PRBG) is required in many aspects of cryptography as well as in other applications of modern security engineering. In this work, PRBG based on 2D symmetrical chaotic mappings of logistic type is considered. The sequences generated

Efficient cancellable biometric key generation scheme for cryptography
ABSTRACT This paper puts forth a fresh methodology for the secure storage of fingerprint template by generating Secured Feature Matrix and keys for cryptographic techniques applied for data Encryption or Decryption with the aid of cancellable biometric features.


research paper and project in cryptography-12

research paper and project in cryptography-14 CSE PROJECTS