نتایج جستجو برای: cryptography

تعداد نتایج: 38324  

2015
Mohammadreza Najaftorkaman Nazanin Sadat Kazazi

DNA cryptography is a relatively new paradigm that has attracted great interest in the field of information security. Although there are many problems in DNA cryptography, scientists are trying to solve them because they believe that, with the extraordinary information density and the vast parallelism that are inherent in DNA computers, it is possible to make a secure system. In this study, we ...

2014
Jean-Claude Bajard Julien Eynard Nabil Merkiche Thomas Plantard

Lattice based cryptography is claimed as a serious candidate for post quantum cryptography, it recently became an essential tool of modern cryptography. Nevertheless, if lattice based cryptography has made theoretical progresses, its chances to be adopted in practice are still low due to the cost of the computation. If some approaches like RSA and ECC have been strongly optimized in particular ...

2013
Ajit Singh Swati Malik

Securing data is a challenging issue in today’s era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to the eavesdropper. There arises a need of data hiding. So here we are using a combina...

2013
Pille Pullonen Peeter Laud

Recently the frameworks of abstract and constructive cryptography have been proposed by Maurer et al [MR11, Mau11, Mau10, Mau09]. These aim to redefine the common view of cryptographic security proofs and definitions. However, in a sense these ideas can be seen both as a protest and a generalisation of the current state of the art. First, a protest because current definitions and proofs are bui...

2013
Mehrdad Sepehri Sharbaf

For the past decade progress in quantum cryptography changed the status of quantum key distribution (QKD) from laboratory to the practical innovation technology. Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. Quantum cryptography applies the uncertainty principle and the no-cloning theorem of qu...

2016
Abhishek Agnihotri

By the development of ultra high-speed computers, existing modern cryptography could be failed whereas Quantum cryptography guarantees the secure communication whose security based on the legality of quantum mechanics. This research paper concentrates on the strong basics of quantum cryptography and how it guarantees the secure communication over the network. There are two ways to conduct Quant...

1997
Yvo Desmedt

In the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Depending from the application the sender or the receiver (or both) need to use a secret key. Often we are not dealing with an individual sender/receiver, but the sender/receiver is an organization. The goal of threshold cryptography is to present practical sch...

2011
Rajashekhara Babu

The Requirement of information security on topology network has become more important. Cryptography is a method to provide information confidentiality, authenticity and integrity. There are so many challenges to implement a public key cryptography algorithm such as execution time, time consuming, time cost, integrated methods, memory Requirement in public key cryptography. In parallel computati...

2006

Cryptography is an interdisciplinary subject, drawing from several fields. Older forms of cryptography were chiefly concerned with patterns in language. More recently, the emphasis has shifted, and cryptography makes extensive use of mathematics, particularly discrete mathematics, including topics from number theory, information theory, computational complexity, statistics and combinatorics. Cr...

Journal: :CoRR 2008
Solange Ghernaouti-Helie Igli Tashi Thomas Länger Christian Monyk

1 ABSTRACT In contemporary cryptographic systems, secret keys are usually exchanged by means of methods, which suffer from mathematical and technology inherent drawbacks. That could lead to unnoticed complete compromise of cryptographic systems, without a chance of control by its legitimate owners. Therefore a need for innovative solutions exists when truly and reliably secure transmission of s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید