نتایج جستجو برای: cryptography
تعداد نتایج: 38324 فیلتر نتایج به سال:
Currently, most of the existing public-key encryption schemes are based on complex algorithms with heavy computations. In 1994, Naor and Shamir proposed a simple cryptography method for digital images called visual cryptography. Existing visual cryptography primitives can be considered as a special kind of secret-key cryptography that does not require heavy computations for encrypting and decry...
7.1 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 7.1.1 Overview of Cryptography . . . . . . . . . . . 130 7.1.2 Symmetric-Key Cryptography . . . . . . . . 130 7.1.3 Substitution and Transposition Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 131 7.1.4 Data Encryption Standard (DES) . . . . . 133 7.1.5 Advanced Encryption Standard (AES) . 134 7.1.6 Public...
Introduction to Cryptography with Open-Source Software is a well written text book covering many aspects: an introduction to cryptography, a clever use of the open source algebra system Sage and various exercises on cryptography and Sage. It provides a very good understanding of practical cryptography. Many mathematical algorithms and cryptographic schemes are discussed in detail and illustrate...
The book is aimed at bridging the gap between cryptography and its standard applications. From my point of view, it has achieved its goal. This book presents basic tools of cryptography with applications in communication and information security. This book is a compilation of author’s lecture notes that he used for teaching cryptography to undergraduate students. Though this book is titled like...
Recently, the ThreeBallot voting scheme has been proposed as a means of providing a voter with a non-transferable receipt for their vote without resorting to more traditional means of cryptography. The ThreeBallot scheme is attractive because voters are not required to either understand complex cryptography present in other voting schemes, or more usually, trust a software or hardware artifact ...
Visual cryptography is a secret sharing technique mainly used for image sharing. In the case of extended visual cryptography we use meaningful shares to hide image. Contrast loss in decrypted image is a major problem. Here we use Additional basis matrix and perfect white pixel reconstruction to improve the contrast in color extended visual cryptography. Keywords— Visual Cryptography (VC), Halft...
It is generally accepted that data encryption is the key role in current and future technologies. Many Public key cryptography schemes were presented, divided into different classes depending on a specific mathematical problem. Cryptography plays an important task in accomplishing information security. It is used for encrypting or signing data at the source before transmission, and then decrypt...
چکیده ندارد.
DNA Cryptography is a new born cryptography that overcomes the difficulties of traditional cryptography due to its extraordinary information density inherent in DNA molecules, exceptional energy efficiency and vast parallelism. A lot of work have been done in this area based on different techniques like –DNA synthesis, PCR, Electrophoresis etc. In this paper various trends in DNA Cryptography a...
ryptography is study of transforming information in order to make it secure from unintended recipients. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts any information [picture, printed text, etc] such that decryption can be performed using human visual system. The goal of this survey paper is to give the readers an overview of the basic visual cryptography schemes const...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید