نتایج جستجو برای: cryptology

تعداد نتایج: 644  

2012
Stephen Rodrigues

A new reflecting surface capable of simulating identical reflecting properties of a metallic plate with rectangular corrugations is reported. The new surface which is fabricated with a low loss dielectric plate of uniform thickness .One surface of the plate is periodically loaded with a grill structure of conducting wires and the other surface is completely metalized with copper. Depending on t...

2012
Steven Chaplick Vít Jelínek Jan Kratochvíl Tomás Vyskocil

In this paper we study properties of intersection graphs of kbend paths in the rectangular grid. A k-bend path is a path with at most k 90 degree turns. The class of graphs representable by intersections of k-bend paths is denoted by Bk-VPG. We show here that for every fixed k, Bk-VPG ( Bk+1-VPG and that recognition of graphs from Bk-VPG is NP-complete even when the input graph is given by a Bk...

Journal: :CoRR 2010
Harshvardhan Tiwari Krishna Asawa

Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is prese...

2007
Cheng Yang Lihe Zhang

Cheng Yang(1974‐), Ph.D., graduate from Beijing University of Post and Telecomms. Lihe Zhang(1976‐), Ph.D., graduate from Beijing University of Post and Telecomms. Abstract: At present, most mobile terminals haven’t any functions of rights management, and cryptology-based method can’t resolve all the copyright problems in mobile digital distribution service. With the urge demand of digital righ...

Journal: :IACR Cryptology ePrint Archive 2001
Ronald Cramer Victor Shoup

A new public key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quite practical, and are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions. These appear to be the first publickey encryption schemes in the literature that are simultaneously practical and provably secure. This paper is a sig...

Journal: :International Journal of Science and Research Archive 2022

The technique of securing information or data in the form images, codes, merging words etc are closely related to disciplines cryptanalysis and cryptology. Analogous this numerical encoding chemical structure, connected topological indices is also growing significantly field graph theory. One salient features predict characteristics prescribed by molecule's structure. In paper, we calculate two...

2005

What do you do to start reading cryptographic hardware and embedded systems ches 2005 7th international workshop edinburgh uk august 29 september 1 2005 proceedings computer science security and cryptology? Searching the book that you love to read first or find an interesting book that will make you want to read? Everybody has difference with their reason of reading a book. Actuary, reading hab...

2010
Utku KOSE

In today’s world, information security is an essential factor, which must be taken into consider to ensure secure applications and services in information technology. Since the inception of the information technology concept, there has been a remarkable interest in security approaches that aim to protect information or digital data. Especially, rise of the Internet and internet technologies has...

2016
Maria Khvalchik Anagha Kulkarni

There are many situations in our everyday life where we look for answers to some questions “Who wrote this book?”, “How to grill a fish?” or “Where is the Opera House located?”. Twenty years ago to answer these questions people were looking them up in the encyclopedias, recipe books or were asking other people. Moving the information into the electronic form and making it universally access...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید