نتایج جستجو برای: secret key

تعداد نتایج: 564100  

Journal: :IEEE Transactions on Information Forensics and Security 2011

Journal: :International Journal of Advanced Computer Science and Applications 2011

Journal: :The Journal of Korea Information and Communications Society 2014

2015
Chien-Chang Chen Yao-Hong Tsai

This study presents an expandable essential secret image sharing structure showing that some important shared images, named essential ones, are necessary when recovering the secret image and the proposed structure must incorporate other secret image sharing scheme to expand to a new secret image sharing scheme with multiple functions. An (s, t, n) essential secret image sharing structure shares...

2014
R. Sarath

A new approach for secret sharing of key in networks is proposed in this paper. Secret key sharing is an important problem in cryptography. This paper explains how secret key can be safely transmitted by combining Classical cryptography and Quantum techniques. The usage of dual channel technique and programmable polarizer are analyzed which ensure the way to remove the practical difficulties of...

2009
Julia Borghoff Lars R. Knudsen Gregor Leander Krystian Matusiewicz

We present several attacks on the block cipher C2, which is used for encrypting DVD Audio discs and Secure Digital cards. C2 has a 56 bit key and a secret 8 to 8 bit S-box. We show that if the attacker is allowed to choose the key, the S-box can be recovered in 2 C2 encryptions. Attacking the 56 bit key for a known S-box can be done in complexity 2. Finally, a C2 implementation with a 8 to 8 bi...

2012
Tsz Hon Yuen Sherman S. M. Chow Ye Zhang Siu-Ming Yiu

We devise the first identity-based encryption (IBE) that remains secure even when the adversary is equipped with auxiliary input (STOC ’09) – any computationally uninvertible function of the master secret key and the identity-based secret key. In particular, this is more general than the tolerance of Chow et al.’s IBE schemes (CCS ’10) and Lewko et al.’s IBE schemes (TCC ’11), in which the leak...

Journal: :International Journal of Computer Applications 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید