نتایج جستجو برای: symmetric key

تعداد نتایج: 629241  

2009
Allan Rasmussen

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Discrete Memoryless Channels . . . . . . . . . . . . . . . . . . . . . . . . 2 The Binary Symmetric Channel . . . . . . . . . . . . . . . . . . . . . . . 4 Secrecy Capacity of a Channel . . . . . . . . . . . . . . . . . . . . . . . . 9 Secret Key Agreement Rate by Public Discussion . . . . . . . . . . . . . 17 On...

Journal: :CoRR 2014
Si-Hui Tan Joshua A. Kettlewell Yingkai Ouyang Lin Chen Joseph Fitzsimons

Encryption schemes often derive their power from the properties of the underlying algebra on the symbols used. Inspired by group theoretic tools, we use the centralizer of the group of unitary operations to present a private-key quantum homomorphic encryption scheme that hides arbitrary quantum computations. A particular instance of our encoding hides information at least proportional to m/ log...

Journal: :RFC 2011
Sean Turner

This document describes the conventions for using several cryptographic algorithms with the Cryptographic Message Syntax (CMS) to protect the symmetric key package content type. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as ...

Journal: :IACR Cryptology ePrint Archive 2012
Rajeswari Mukesh

Image compression and image encryption are pivotal to proper storage and transmission of images over MANET. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The Number Theory based Image Compression and Quasigroup Encryption (NTICQE) algorithm employs number theoretic paradigm Chinese Remainder Theorem and Quasigroup E...

Journal: :Dagstuhl Reports 2014
Erika Ábrahám Alberto Avritzer Anne Remke William H. Sanders

From 05.01.2014 to 10.01.2014, the Seminar 14021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this pa...

Journal: :CoRR 2018
Florian Caullery François Rodier

The absolute indicator is one of the measures used to determine the resistance offered by a Boolean function when used in the design of a symmetric cryptosystem. It was proposed along with the sum of square indicator to evaluate the quality of the diffusion property of block ciphers and hash functions. While the behaviour of the sum of square of random Boolean functions was already known, what ...

2006
Zhan Liu Mi Lu

This paper present a new protocol based on symmetric encryption, which has quasi-forward secrecy and resistance to quasi-key compromise impersonation. It is a protocol suitable for computation-limited devices. Also by blinding the long-term key, we make the attack to long-term key harder.We have done the theoretical analysis and will finish the simulation and implementation.

Journal: :IACR Cryptology ePrint Archive 2014
Simona Samardjiska Danilo Gligoroski

We propose a new general framework for the security of multivariate quadratic (MQ) schemes with respect to attacks that exploit the existence of linear subspaces. We adopt linearity measures that have been used traditionally to estimate the security of symmetric cryptographic primitives, namely the nonlinearity measure for vectorial functions introduced by Nyberg at Eurocrypt ’92, and the (s, t...

2006
ANDREA DAVINI

We consider two–phase metrics of the form φ(x, ξ) := αχBα(x) |ξ|+βχBα(x) |ξ|, where α,β are fixed positive constants, and Bα, Bβ are disjoint Borel sets whose union is R , and we prove that they are dense in the class of symmetric Finsler metrics φ satisfying α|ξ| ≤ φ(x, ξ) ≤ β|ξ| on R × R . Then we study the closure Cl(M θ ) of the class M α,β θ of two–phase periodic metrics with prescribed vo...

Journal: :CoRR 2012
Rupam Kumar Sharma

Cryptography is an important field in the area of data encryption. There are different cryptographic techniques available varying from the simplest to complex. One of the complex symmetric key cryptography techniques is using Data Encryption Standard Algorithm. This paper explores a unique approach to generation of key using fingerprint. The generated key is used as an input key to the DES Algo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید