Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 11-20 of 44 total results
Modular exponential multivariate sequence and its ...
Jia Wang received both her B.Eng. and M.Eng. degrees from Shandong University in 2011 and 2014, respectively and the Ph.D. degree in electronic engineering from City University of Hong Kong, Hong Kong SAR of China, in 2017. She is currently a research associate in Shenzhen University, China. Her research interests include security and privacy-preserving design for Internet of Things, Cloud ...
Review on Network Security and Cryptography
• Twofish: A 128-bit block cipher using 128-, 192-, or 256-bit keys. Designed to be highly secure and highly flexible, well-suited for large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Designed by a team led by Bruce Schneier and was one of the Round 2 algorithms in the AES process.
pubs.sciepub.com/iteces/3/1/1/index.html
Average Rating (0 votes)
Papers from EPRINT 2004
In~\cite{B02} it was proved that 20 out of 64 PGV-hash functions~\cite{P94} based on block cipher are collision resistant and one-way-secure in black-box model of the underlying block cipher. Here, we generalize the definition of PGV-hash function into a hash family and we will prove that besides the previous 20 hash functions we have 22 more ...
US7035409B1 - Multiple transform utilization and ...
Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified ...
 Full text of "Smart card research and applications : third ...
Full text of "Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings" See other formats
Papers and Patents - FURUKAWA Lab
Takaya Hino, Osamu Muta, and Hiroshi Furukawa, ``Performance Evaluation of OQAM Based OFDM Systems Using an ACLR and EVM Restricted Peak Amplitude Cancellation Scheme,'' IEEE International Conference on Communication Systems 2014, Nov. 2014.
An Overview of Cryptography - Gary Kessler
Twofish: A 128-bit block cipher using 128-, 192-, or 256-bit keys. Designed to be highly secure and highly flexible, well-suited for large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Designed by a team led by Bruce Schneier and was one of the Round 2 algorithms in the AES process.
Computer Security Final Flashcards | Quizlet
•Construct an affine transformation that maps 4 letter blocks to other 4 letter blocks HOWDY DOO becomes HOWD YDOO replace A=00, B=01, etc. HOWD YDOO becomes 07142203 24031414 The largest value that can appear in a block of 4 is ZZZZ = 25252525. So use modulo 25252526 Encipher: C ≡ mP + b (mod 25252526) Decipher: P ≡ m' (C-b) (mod 25252526)
Papers from EPRINT 2010
Remote authentication is a method to authenticate remote users over insecure communication channel. Password-based authentication schemes have been widely deployed to verify the legitimacy of remote users. Very recently, Hwang et al. proposed a DoS-resistant ID-based password authentication scheme using smart cards.
1 2 3 4 5
Pages
|