نتایج جستجو برای: cryptology

تعداد نتایج: 644  

2007
Christophe de Canniére Carlos Cid RHUL Henri Gilbert Matthew Parker Hongjun Wu

The information in this document is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.

Journal: :CoRR 2017
Thierry P. Berger Cheikh Thiécoumba Gueye Jean Belo Klamti

Most of the codes that have an algebraic decoding algorithm are derived from the Reed Solomon codes. They are obtained by taking equivalent codes, for example the generalized Reed Solomon codes, or by using the so-called subfield subcode method, which leads to Alternant codes and Goppa codes over the underlying prime field, or over some intermediate subfield. The main advantages of these constr...

Journal: :IJISP 2012
Allan Rwabutaza Ming Yang Nikolaos G. Bourbakis

Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. On one hand, there is cryptography, which is the secret communication between two parties by message scrambling on the sender’s side and message unscrambling on the receiver’s side so tha...

2005
Robert Granger

This thesis studies the implications of using public key cryptographic primitives that are based in, or map to, the multiplicative group of finite fields with small extension degree. A central observation is that the multiplicative group of extension fields essentially decomposes as a product of algebraic tori, whose properties allow for improved communication efficiency. Part I of this thesis ...

1997
Friedrich L. Bauer

Chapter 4 (Encryption Steps: Polygraphic Substitution and Coding) extends the preceding chapter by polygraphic ciphers, introducing bigraphic and trigraphic substitution and tomographic methods. As in the preceding chapter, there is a theoretical description of each method as well as a detailed explanation of the single steps of calculation using a concrete cipher as an example. These examples ...

2008

progress in cryptology indocrypt 2008 9th international progress in cryptology indocrypt 2008 9th international progress in cryptology indocrypt 2008 9th international co lecture notes in computer science 5365 home springer lecture notes in computer science 5365 researchgate manual doupnik international accounting marsal dsc alarm keypad user manual illusi navy officer aptitude rating study gui...

Journal: :IACR Cryptology ePrint Archive 2006
Jaroslav Hruby

We discuss the general theoretical ideas of the possibility using cryptosystems based on the partial differential equations (PDE) and the role of inverse scattering problem for the cryptanalysis as the possible way to the postquantum cipher scheme. An application of the nonlinear Schrödinger equation and optical fibre technology in cryptology is presented.

Journal: :Comput. J. 2010
Lein Harn Wen-Jung Hsin Changlu Lin

1Department of Computer Science and Electrical Engineering, University of Missouri-Kansas City, Kansas City MO 64110, USA 2Department of Information and Computer Science, Park University, Parkville, MO 64152, USA 3State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing 10049, P.R. China 4Key Laboratory of Network Security and Cryptology, Fujian ...

2012
Antoine Joux

Cryptology and computers have a long common history; in fact, some of the early computers were created as cryptanalytic tools. The development of faster and widely deployed computers also had a great impact on cryptology, allowing modern cryptography to become a practical tool. Today, both computers and cryptology are not only practical, but they have became ubiquitous tools. In truth, computin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید