منابع مشابه
Estimating the Information Theoretic Optimal Stego Noise
We recently developed a new benchmark for steganography, underpinned by the square root law of capacity, called Steganographic Fisher Information (SFI). It is related to the multiplicative constant for the square root capacity rate and represents a truly information theoretic measure of asymptotic evidence. Given a very large corpus of covers from which the joint histograms can be estimated, an...
متن کاملSoftware-Based ECC for GPUs
Commodity off-the-shelf GPUs lack error checking mechanisms for graphics memory, whereas conventional HPC platforms have used hardware-based ECC for DRAMs. To alleviate this reliability concern, we propose a software-based ECC for GPGPU applications. We add small program codes to normal CUDA programs that compute ECCs for data residing in graphics memory so that transient bit-flips can be detec...
متن کاملKnapsack Based ECC Encryption and Decryption
Elliptic Curve Cryptography provides a secure means of exchanging keys among communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and Decryption of texts and messages have also been attempted. This paper presents the implementation of ECC by first transforming the message into an affine point on the EC, and then applying the knapsack algorithm on ECC encrypted message...
متن کاملAn ECC-Based Blind Signature Scheme
Cryptography is increasingly applied to the E-commerce world, especially to the untraceable payment system and the electronic voting system. Protocols for these systems strongly require the anonymous digital signature property, and thus a blind signature strategy is the answer to it. Chaum stated that every blind signature protocol should hold two fundamental properties, blindness and intractab...
متن کاملEfficient Generalized Signcryption Based on Ecc
In order to obtain promising wireless communication systems, it is necessary to maintain secure message transmissions in unicast, multicast, or broadcast scenarios. The cryptographic primitives can be incorporated when a node needs to submit messages to different receivers as encrypted and/or authenticated one-way messages. For achieving the given objective, signcryption schemes are efficient p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EPJ Web of Conferences
سال: 2014
ISSN: 2100-014X
DOI: 10.1051/epjconf/20146800013