منابع مشابه
Chaos-based Cryptography: an overview
We review some of the recent work on chaos-based cryptography. We argue that if a chaotic map f is used in cryptography, then it should be implemented as a bijection FM : D → D, where D is a finite set with cardinality M, such that, for large M, FM ‘approximates well’ the chaotic map f . Several examples, including chaotic block cypher and chaotic public-key encryption algorithm, are given.
متن کاملLattices and Cryptography: An Overview
We briefly discuss the history of lattices and cryptography during the last fifteen years. A lattice is a discrete subgroup of R or equivalently the set L
متن کاملCryptography in OpenBSD: An Overview
Cryptographic mechanisms are an important se curity component of an operating system in secur ing the system itself and its communication paths Indeed in many situations cryptography is the only tool that can solve a particular problem e g network level security While cryptography by it self does not guarantee security when applied cor rectly it can signi cantly improve overall security Since o...
متن کاملAn Overview of Various Visual Cryptography Schemes
Information is increasingly important in our daily life. Information gets more value when shared with others. Due to advances in technologies related to networking and communication, it is possible to share the information like audio, video and image easily. It may give rise to security related issues. Attackers may try to access unauthorized data and misuse it. To solve this problem certain te...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The European Physical Journal Special Topics
سال: 2019
ISSN: 1951-6355,1951-6401
DOI: 10.1140/epjst/e2019-900044-x