نتایج جستجو برای: symmetric key
تعداد نتایج: 629241 فیلتر نتایج به سال:
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Discrete Memoryless Channels . . . . . . . . . . . . . . . . . . . . . . . . 2 The Binary Symmetric Channel . . . . . . . . . . . . . . . . . . . . . . . 4 Secrecy Capacity of a Channel . . . . . . . . . . . . . . . . . . . . . . . . 9 Secret Key Agreement Rate by Public Discussion . . . . . . . . . . . . . 17 On...
Encryption schemes often derive their power from the properties of the underlying algebra on the symbols used. Inspired by group theoretic tools, we use the centralizer of the group of unitary operations to present a private-key quantum homomorphic encryption scheme that hides arbitrary quantum computations. A particular instance of our encoding hides information at least proportional to m/ log...
This document describes the conventions for using several cryptographic algorithms with the Cryptographic Message Syntax (CMS) to protect the symmetric key package content type. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as ...
Image compression and image encryption are pivotal to proper storage and transmission of images over MANET. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The Number Theory based Image Compression and Quasigroup Encryption (NTICQE) algorithm employs number theoretic paradigm Chinese Remainder Theorem and Quasigroup E...
From 05.01.2014 to 10.01.2014, the Seminar 14021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this pa...
The absolute indicator is one of the measures used to determine the resistance offered by a Boolean function when used in the design of a symmetric cryptosystem. It was proposed along with the sum of square indicator to evaluate the quality of the diffusion property of block ciphers and hash functions. While the behaviour of the sum of square of random Boolean functions was already known, what ...
This paper present a new protocol based on symmetric encryption, which has quasi-forward secrecy and resistance to quasi-key compromise impersonation. It is a protocol suitable for computation-limited devices. Also by blinding the long-term key, we make the attack to long-term key harder.We have done the theoretical analysis and will finish the simulation and implementation.
We propose a new general framework for the security of multivariate quadratic (MQ) schemes with respect to attacks that exploit the existence of linear subspaces. We adopt linearity measures that have been used traditionally to estimate the security of symmetric cryptographic primitives, namely the nonlinearity measure for vectorial functions introduced by Nyberg at Eurocrypt ’92, and the (s, t...
We consider two–phase metrics of the form φ(x, ξ) := αχBα(x) |ξ|+βχBα(x) |ξ|, where α,β are fixed positive constants, and Bα, Bβ are disjoint Borel sets whose union is R , and we prove that they are dense in the class of symmetric Finsler metrics φ satisfying α|ξ| ≤ φ(x, ξ) ≤ β|ξ| on R × R . Then we study the closure Cl(M θ ) of the class M α,β θ of two–phase periodic metrics with prescribed vo...
Cryptography is an important field in the area of data encryption. There are different cryptographic techniques available varying from the simplest to complex. One of the complex symmetric key cryptography techniques is using Data Encryption Standard Algorithm. This paper explores a unique approach to generation of key using fingerprint. The generated key is used as an input key to the DES Algo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید