Web
Education
Modular exponential multivariate sequence and its ...
Jia Wang received both her B.Eng. and M.Eng. degrees from Shandong University in 2011 and 2014, respectively and the Ph.D. degree in electronic engineering from City University of Hong Kong, Hong Kong SAR of China, in 2017. She is currently a research associate in Shenzhen University, China. Her research interests include security and privacy-preserving design for Internet of Things, Cloud ...
Review on Network Security and Cryptography
• Twofish: A 128-bit block cipher using 128-, 192-, or 256-bit keys. Designed to be highly secure and highly flexible, well-suited for large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Designed by a team led by Bruce Schneier and was one of the Round 2 algorithms in the AES process.
Papers from EPRINT 2004
In~\cite{B02} it was proved that 20 out of 64 PGV-hash functions~\cite{P94} based on block cipher are collision resistant and one-way-secure in black-box model of the underlying block cipher. Here, we generalize the definition of PGV-hash function into a hash family and we will prove that besides the previous 20 hash functions we have 22 more ...
US7035409B1 - Multiple transform utilization and ...
Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified ...
Full text of "Smart card research and applications : third ...
Full text of "Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings" See other formats
Full text of "An introduction to cryptography"
This banner text can have markup.. web; books; video; audio; software; images; Toggle navigation
Papers and Patents - FURUKAWA Lab
Takaya Hino, Osamu Muta, and Hiroshi Furukawa, ``Performance Evaluation of OQAM Based OFDM Systems Using an ACLR and EVM Restricted Peak Amplitude Cancellation Scheme,'' IEEE International Conference on Communication Systems 2014, Nov. 2014.
An Overview of Cryptography - Gary Kessler
Twofish: A 128-bit block cipher using 128-, 192-, or 256-bit keys. Designed to be highly secure and highly flexible, well-suited for large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Designed by a team led by Bruce Schneier and was one of the Round 2 algorithms in the AES process.
Computer Security Final Flashcards | Quizlet
•Construct an affine transformation that maps 4 letter blocks to other 4 letter blocks HOWDY DOO becomes HOWD YDOO replace A=00, B=01, etc. HOWD YDOO becomes 07142203 24031414 The largest value that can appear in a block of 4 is ZZZZ = 25252525. So use modulo 25252526 Encipher: C ≡ mP + b (mod 25252526) Decipher: P ≡ m' (C-b) (mod 25252526)
Papers from EPRINT 2010
Remote authentication is a method to authenticate remote users over insecure communication channel. Password-based authentication schemes have been widely deployed to verify the legitimacy of remote users. Very recently, Hwang et al. proposed a DoS-resistant ID-based password authentication scheme using smart cards.
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.