The cryptographic data transcoding operations matrix models synthesis method
نویسندگان
چکیده
منابع مشابه
Leakage Quantification of Cryptographic Operations
Perfectly secure protocols are often too inefficient performance wise to be used in a practical setting. On the other hand, an insecure (but faster) protocol might be deemed secure for a particular setting. Recent research has thus focused on precise leakage quantification of a security protocol. In this context, we first give precise leakage quantification of a basic cryptographic primitive, t...
متن کاملMatrix representation of cryptographic functions
The Discrete Logarithm and the Diffie-Hellman are two hard computational problems, closely related to cryptography and its applications. The computational equivalence of these problems has been proved only for some special cases. In this study, using LU-decomposition to Vandermonde matrices, we are able to transform the two problems in terms of matrices, thus giving a new perspective to their e...
متن کاملData Security Algorithms for Cloud Storage System using Cryptographic Method
Cloud computing paradigm enables the users to access the outsourced data from the cloud server without the hardware and software management. For the effective utilization of sensitive data from CSP, the data owner encrypts before outsourcing to the cloud server. To protect data in cloud, data privacy is the challenging task. In order to address this problem, we proposed an efficient data securi...
متن کاملData Structures and Algorithms for Distributed Sparse Matrix Operations
We propose extensions of the classical row compressed storage format for sparse matrices. The extensions are designed to accomodate distributed storage of the matrix. We outline an implementation of the matrix-vector product using this distributed storage format, and give algorithms for building and using the communication structure between processors.
متن کاملThe Transcoding Pipeline: Automatic Generation of 3D Models from Geospatial Data Sources
We present a pipeline to create interactive three-dimensional visualizations from 2D geospatial databases. Our application area is the underground infrastructure owned and operated by utility companies. The transcoding pipeline generates urban 3D models, which are based on real-world data and encoded in a scene-graph with semantic markup. We demonstrate the applicability of such models in an Au...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ukrainian Information Security Research Journal
سال: 2012
ISSN: 2410-7840,2221-5212
DOI: 10.18372/2410-7840.14.3360