نتایج جستجو برای: cryptography

تعداد نتایج: 38324  

2010
Abdullah M. Jaafar Azman Samsudin

Currently, most of the existing public-key encryption schemes are based on complex algorithms with heavy computations. In 1994, Naor and Shamir proposed a simple cryptography method for digital images called visual cryptography. Existing visual cryptography primitives can be considered as a special kind of secret-key cryptography that does not require heavy computations for encrypting and decry...

2010
Kai Xi Jiankun Hu

7.1 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 7.1.1 Overview of Cryptography . . . . . . . . . . . 130 7.1.2 Symmetric-Key Cryptography . . . . . . . . 130 7.1.3 Substitution and Transposition Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 131 7.1.4 Data Encryption Standard (DES) . . . . . 133 7.1.5 Advanced Encryption Standard (AES) . 134 7.1.6 Public...

2014
Alasdair McAndrew Abderrahmane Nitaj

Introduction to Cryptography with Open-Source Software is a well written text book covering many aspects: an introduction to cryptography, a clever use of the open source algebra system Sage and various exercises on cryptography and Sage. It provides a very good understanding of practical cryptography. Many mathematical algorithms and cryptographic schemes are discussed in detail and illustrate...

2005
Serge Vaudenay

The book is aimed at bridging the gap between cryptography and its standard applications. From my point of view, it has achieved its goal. This book presents basic tools of cryptography with applications in communication and information security. This book is a compilation of author’s lecture notes that he used for teaching cryptography to undergraduate students. Though this book is titled like...

2007
Tim Storer

Recently, the ThreeBallot voting scheme has been proposed as a means of providing a voter with a non-transferable receipt for their vote without resorting to more traditional means of cryptography. The ThreeBallot scheme is attractive because voters are not required to either understand complex cryptography present in other voting schemes, or more usually, trust a software or hardware artifact ...

2015
Alkha Mohan

Visual cryptography is a secret sharing technique mainly used for image sharing. In the case of extended visual cryptography we use meaningful shares to hide image. Contrast loss in decrypted image is a major problem. Here we use Additional basis matrix and perfect white pixel reconstruction to improve the contrast in color extended visual cryptography. Keywords— Visual Cryptography (VC), Halft...

2012
H. Modares M. T. Shahgoli H. Keshavarz A. Moravejosharieh R. Salleh

It is generally accepted that data encryption is the key role in current and future technologies. Many Public key cryptography schemes were presented, divided into different classes depending on a specific mathematical problem. Cryptography plays an important task in accomplishing information security. It is used for encrypting or signing data at the source before transmission, and then decrypt...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1387

چکیده ندارد.

2014
Jyoti Chauhan Anchal Jain

DNA Cryptography is a new born cryptography that overcomes the difficulties of traditional cryptography due to its extraordinary information density inherent in DNA molecules, exceptional energy efficiency and vast parallelism. A lot of work have been done in this area based on different techniques like –DNA synthesis, PCR, Electrophoresis etc. In this paper various trends in DNA Cryptography a...

2014
Mona F. M. Mursi Manal Mansour

ryptography is study of transforming information in order to make it secure from unintended recipients. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts any information [picture, printed text, etc] such that decryption can be performed using human visual system. The goal of this survey paper is to give the readers an overview of the basic visual cryptography schemes const...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید