نتایج جستجو برای: cryptography
تعداد نتایج: 38324 فیلتر نتایج به سال:
DNA cryptography is a relatively new paradigm that has attracted great interest in the field of information security. Although there are many problems in DNA cryptography, scientists are trying to solve them because they believe that, with the extraordinary information density and the vast parallelism that are inherent in DNA computers, it is possible to make a secure system. In this study, we ...
Lattice based cryptography is claimed as a serious candidate for post quantum cryptography, it recently became an essential tool of modern cryptography. Nevertheless, if lattice based cryptography has made theoretical progresses, its chances to be adopted in practice are still low due to the cost of the computation. If some approaches like RSA and ECC have been strongly optimized in particular ...
Securing data is a challenging issue in today’s era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to the eavesdropper. There arises a need of data hiding. So here we are using a combina...
Recently the frameworks of abstract and constructive cryptography have been proposed by Maurer et al [MR11, Mau11, Mau10, Mau09]. These aim to redefine the common view of cryptographic security proofs and definitions. However, in a sense these ideas can be seen both as a protest and a generalisation of the current state of the art. First, a protest because current definitions and proofs are bui...
For the past decade progress in quantum cryptography changed the status of quantum key distribution (QKD) from laboratory to the practical innovation technology. Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. Quantum cryptography applies the uncertainty principle and the no-cloning theorem of qu...
By the development of ultra high-speed computers, existing modern cryptography could be failed whereas Quantum cryptography guarantees the secure communication whose security based on the legality of quantum mechanics. This research paper concentrates on the strong basics of quantum cryptography and how it guarantees the secure communication over the network. There are two ways to conduct Quant...
In the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Depending from the application the sender or the receiver (or both) need to use a secret key. Often we are not dealing with an individual sender/receiver, but the sender/receiver is an organization. The goal of threshold cryptography is to present practical sch...
The Requirement of information security on topology network has become more important. Cryptography is a method to provide information confidentiality, authenticity and integrity. There are so many challenges to implement a public key cryptography algorithm such as execution time, time consuming, time cost, integrated methods, memory Requirement in public key cryptography. In parallel computati...
Cryptography is an interdisciplinary subject, drawing from several fields. Older forms of cryptography were chiefly concerned with patterns in language. More recently, the emphasis has shifted, and cryptography makes extensive use of mathematics, particularly discrete mathematics, including topics from number theory, information theory, computational complexity, statistics and combinatorics. Cr...
1 ABSTRACT In contemporary cryptographic systems, secret keys are usually exchanged by means of methods, which suffer from mathematical and technology inherent drawbacks. That could lead to unnoticed complete compromise of cryptographic systems, without a chance of control by its legitimate owners. Therefore a need for innovative solutions exists when truly and reliably secure transmission of s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید