" Number Theory and Cryptography "
نویسندگان
چکیده
The book is a selection of papers from a wide variety of topics in Cryptography and Number Theory, presented at the 33rd Annual Meeting of the Australian Mathematical Society and at the Workshop on Number Theory and Cryptography in Telecommunications in 1989. The book is composed of three parts that focus on a range of topics such as stream ciphers, applications of cryptography, number theory, integer factorization algorithms and authentication mechanisms, to name a few.
منابع مشابه
Improving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملOn the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملApplications of Number Theory in Cryptography
Cryptography is the practice of hiding information, converting some secret information to not readable texts. Applications of cryptography include military information transmission, computer passwords, electronic commerce, and others. This paper aims to introduce the reader to applications of number theory in cryptography. We will briefly talk about the idea of encryption and public key cryptos...
متن کاملChaos-based Pseudo-Random Number Generators and Chip Implementation
Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today’s ubiquitous Internet communication, which as an open network is vulnerable to attack. In this paper, chaos-based cryptography is surveyed with focus on designing chaotic pseudo-random number generators (CPRNGs) for stream cipher and their chip implementation. The properties...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013