The cryptographic data transcoding operations matrix models synthesis method

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Leakage Quantification of Cryptographic Operations

Perfectly secure protocols are often too inefficient performance wise to be used in a practical setting. On the other hand, an insecure (but faster) protocol might be deemed secure for a particular setting. Recent research has thus focused on precise leakage quantification of a security protocol. In this context, we first give precise leakage quantification of a basic cryptographic primitive, t...

متن کامل

Matrix representation of cryptographic functions

The Discrete Logarithm and the Diffie-Hellman are two hard computational problems, closely related to cryptography and its applications. The computational equivalence of these problems has been proved only for some special cases. In this study, using LU-decomposition to Vandermonde matrices, we are able to transform the two problems in terms of matrices, thus giving a new perspective to their e...

متن کامل

Data Security Algorithms for Cloud Storage System using Cryptographic Method

Cloud computing paradigm enables the users to access the outsourced data from the cloud server without the hardware and software management. For the effective utilization of sensitive data from CSP, the data owner encrypts before outsourcing to the cloud server. To protect data in cloud, data privacy is the challenging task. In order to address this problem, we proposed an efficient data securi...

متن کامل

Data Structures and Algorithms for Distributed Sparse Matrix Operations

We propose extensions of the classical row compressed storage format for sparse matrices. The extensions are designed to accomodate distributed storage of the matrix. We outline an implementation of the matrix-vector product using this distributed storage format, and give algorithms for building and using the communication structure between processors.

متن کامل

The Transcoding Pipeline: Automatic Generation of 3D Models from Geospatial Data Sources

We present a pipeline to create interactive three-dimensional visualizations from 2D geospatial databases. Our application area is the underground infrastructure owned and operated by utility companies. The transcoding pipeline generates urban 3D models, which are based on real-world data and encoded in a scene-graph with semantic markup. We demonstrate the applicability of such models in an Au...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ukrainian Information Security Research Journal

سال: 2012

ISSN: 2410-7840,2221-5212

DOI: 10.18372/2410-7840.14.3360