نتایج جستجو برای: code based cryptography
تعداد نتایج: 3061053 فیلتر نتایج به سال:
A sanitizable signature scheme is a signature which allows a semi-trusted party called sanitizer to hide parts of the original message after the message is signed, without interacting with the signer. A verifier can confirm the integrity of disclosed parts of the sanitized document from the signature. Sanitizable signatures are quite useful in governmental or military offices, where there is a ...
Of course, cryptography is necessary for a project such as the data haven, and, as the title would imply, discussions of codes and ciphers run throughout the book. Mathematicians with a background in cryptanalysis might be especially interested in a new output-feedback mode stream cipher formally introduced in this book for the first time. The code is described in greater detail in an appendix ...
Cryptographic primitives that are secure against quantum computing are receiving growing attention with recent, steady advances in quantum computing and standardization initiatives in post-quantum cryptography by NIST and ETSI. Lattice-based cryptography is one of the families in post-quantum cryptography, demonstrating desirable features such as well-understood security, efficient performance,...
Introduction. A rapid increase in the number of objects that simultaneously take part combat operations air requires improvement systems for recognizing military both terms qualitative and quantitative indicators. This development appropriate algorithms identifying new-generation "friend-foe" objects. Such can be based on various methods information security, particular symmetric asymmetric cry...
The generalized Hamming weights of a linear code have been extensively studied since Wei first use them to characterize the cryptography performance of a linear code over the wire-tap channel of type II. In this paper, we investigate the generalized Hamming weights of three classes of linear codes constructed through defining sets and determine them partly for some cases. Particularly, in the s...
Cryptography is the science of writing in secret code and is an ancient art. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.visual cryptography is a technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system. This paper introduces the concept of visual informa...
We put forth a new mathematical framework called Isogenous Pairing Groups (IPG) and new intractable assumptions in the framework, the Isogenous DBDH (Isog-DBDH) assumption and its variants. Three operations, i.e., exponentiation, pairing and isogeny on elliptic curves are treated under a unified notion of trapdoor homomorphisms, and combinations of the operations have potential new cryptographi...
Security has become a curial aspect in the design and use of computer system and network. Hash functions are used for many applications in cryptography mainly in digital signatures and message authentication code and in network security. Keccak hash function has been submitted to SHA-3 competition. In this paper has implement “SHA-3 512 bit” hash function and high throughput cone designed to wo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید