Academia.eduAcademia.edu

Cryptography

35,124 papers
150,839 followers
AI Powered
Cryptography is the study and practice of techniques for securing communication and information by transforming it into a format that is unreadable to unauthorized users. It encompasses various methods of encryption and decryption, ensuring confidentiality, integrity, and authenticity of data in digital and physical forms.
We present an asymptotically optimal reduction of one-outof-two String Oblivious Transfer to one-out-of-two Bit Oblivious Transfer using Interactive Hashing in conjunction with Privacy Amplification. Interactive Hashing is used in an... more
Authentication is a well-studied area of classical cryptography: a sender and a receiver sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a... more
In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealing qbc scheme. For a security parameter n, the construction... more
The standard security definition of unconditional secure function evaluation, which is based on the ideal/real model paradigm, has the disadvantage of being overly complicated to work with in practice. On the other hand, simpler ad-hoc... more
Noisy channels are a valuable resource from a cryptographic point of view. They can be used for exchanging secret-keys as well as realizing other cryptographic primitives such as commitment and oblivious transfer. To be really useful,... more
The Wire-Tap Channel of Wyner shows that a Binary Symmetric Channel may be used as a basis for exchanging a secret key, in a crypt,ographic scenario of two honest people facing an eavesdropper. Later CrCpeau and Kilian showed how a BSC... more
Assume A owns two secret k-bit strings. She is willing to disclose one of them to B , at his choosing, provided he does not learn anything about the other string. Conversely, B does not want A to learn which secret he chose to learn. A... more
The e-learning applications of today require a special focus on security. Distributed e-learning applications have several modules user can access using different clients (desktop or mobile). The same user has several accounts with... more
Due to the rapid growth of telemedicine and healthcare services, color medical image security applications have been expanded precipitously. In this paper, an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color... more
Abstract: In recent years, a discussion on relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs has emerged.... more
GOLOVKO V. A., MIKHNO E. V., BRICH A. L., MIKHNYAEV A. L., VOYTSEKHOVICH L. Yu., MATYUSHKOV A. L. The reduced svertochny neural network for exact recognition of hand-written figuresВ данной статье рассматривается сверточная нейронная сеть... more
This paper presents a synthesis of Sebastian Schepis' Prime Resonant Keytriplet framework into the broader architecture of Omniological Resonance Theory (ORT), offering a novel model for non-local, symbolic communication grounded in... more
We present a rigorous formal framework for Prime-Resonant Universal Translation and Non-Local Communication (PR-UTC). Central to the system is the Keytriplet structure (K priv u , K pub u , K res u), a prime-resonant symbolic fingerprint... more
The invention is related to development of a secure, tamperproof, expandable, configurable electronic product for conducting fair polls compared to exiting polling methods. The invented system has been named as Indigenous Voting System... more
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more
NIST is in the process of evaluating public-key digital signature algorithms for potential standardization to protect sensitive information into the foreseeable future, including after the advent of quantum computers. Any signature scheme... more
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital... more
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm -SHA-3, which will augment the hash algorithms currently specified in the Federal... more
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies,... more
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature... more
This work describes the design and implementation of an auction system using secure multiparty computation techniques. Our aim is to produce a system that is practical under actual field constraints on computation, memory, and... more
In developing democracies of the world, the electoral process is often enmeshed in distrust, fraud, unprecedented level of rigging and in most cases ends up in courts of law where millions of hard earned funds (public and private) are... more
As the dependence of daily life is increasing on Internet technology, the attacks on the systems, servers are also rapidly increasing. The motives of attacks are to steal the confidential data from the systems or making the system... more
Steganography is the art and science of secret communication. Various types of media, such as images, videos, audio etc. can be used to hide the message. This paper presents an approach to steganography using LBP on a cluster formed by... more
The history of technology is marked by moments when two forces converge and reshape the world. Today, we stand at one of those inflection points: artificial intelligence (AI) and blockchain technology are not merely approaching each... more
This paper provides a thorough exploration of the applications of nilpotent groups for some n ≥ 1 in cryptography, focusing on their unique algebraic properties and their role in designing secure cryptographic systems. Through an in-depth... more
With increasing popularity and applicability of wireless sensor networks, the limitations which restrict the lifetime of network are also arising. It is observed that the energy utilized in transmission is more than processing the data in... more
In recent times the leakage of personal information and commercial secrets has increased by leaps and bounds. According to statistics in 2007 average no of victims for leak of personal information were 7, 85,568 and average no of victims... more
In this paper, we will go over a novel method to create pseudorandom number generation, this specific algorithm using modular forms to achieve that goal.
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main... more
The revolutionary advancement in the capabilities of hardware tools, software packages, and communication techniques gave rise to the Internet of Things-supported drone networks (IoD), thereby enabling smooth communication among devices... more
Optical tweezers represent a powerful tool for a variety of applications both in biology and in physics. Standard optical tweezers make use of a freely propagating laser beam that is tightly focused near the sample by means of a... more
The quantum cryptography (which is known as key-distribution) is the mechanism introduced to overcome the existing loophole of protection mechanisms to be prevented to compromise the systems with sensitive information. According to the... more
Francis Bacon, born in 1561, was a remarkable figure in English history, excelling as a politician, philosopher, scientist, and writer. Despite facing challenges and persecution, including false bribery charges, Bacon’s brilliance shone... more
The rare 1594 Epicedium is one of the earliest references to the Shakespeare poem The Rape of Lucrece and points to its true author Francis Bacon
Anyone can send a confidential message by just using public information, but the message can only be decrypted with a private key, which is in the sole possession of the intended recipient. It is really appreciable method to provide high... more
1*Research Scholar Singhania University, Jhunjhunu, Rajsthan & Department of MCA, Raj Kumar Goel Engineering College, Ghaziabad, UP, India. dwivediabhi@gmail.com1 2Department of Mathematics, RKG Institute of Technology, Ghaziabad, UP,... more
Bina Darma University has a website where visitors can access various information, but specifically to enter the academic information system, students need to log in first. The log in page is implemented so that the page visitors who... more
In the 1960's voice communication was carried to end subscribers almost exclusively on copper wires running from central office switches to homes and businesses, and television was broadcast to homes almost exclusively through the... more
1M.E Student, Computer Department, Y.T.I.E.T Collage Karjat, Maharashtra, India 2,3Professor, Computer Department, Y.T.I.E.T Collage Karjat, Maharashtra, India... more
1SES’s YADAVRAO TASGAONKAR INSTITUTE OF ENGINEERING AND TECHNOLOGY, DEPARTMENT OF COMPUTER ENGINEERING. 2PROFESSOR, VILLAGE –CHANDHAI, TALUKA–KARJAT, DISTRICT-RAIGAD (MAHARASHTRA), INDIA.... more
Ransomware is a malware family that using security techniques such as cryptography to hijacking user files and associated resources and requests cryptocurrency in exchange for the locked data. There is no limit to who can be targeted by... more