Search Results - "cryptographer"
-
1
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
-
2
Cryptanalysis in cryptographic algorithm design
Published 2006“…The aim of this paper is to create awareness on the importance of cryptanalysis when designing cryptographic algorithms. The strength of a cryptographic algorithm is not fully dependant on the length of the key. …”
Get full text
-
3
Broad view of cryptographic hash functions
Published 2013“…Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. …”
Get full text
Get full text
-
4
-
5
Computation of cryptographic keys from face biometrics
Published 2003“…We outline cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. …”
Get full text
-
6
A Fast Incremental Cryptographic Hash Function
Published 2003“…It turns out that fast cryptographic hash functions have been used extensively and become one of the most important cryptographic primitives. …”
Get full text
-
7
A Fast Incremental Cryptographic Hash Function
Published 2003“…It turns out that fast cryptographic hash functions have been used extensively and become one of the most important cryptographic primitives. …”
Get full text
-
8
-
9
Cryptographic hash function: a high level view
Published 2015“…Cryptographic hash function verifies data integrity and sender identity or source of information. …”
Get full text
Get full text
-
10
A cryptographic one-to-many reversible mapping and it's applications
Published 2014“…This paper presents a novel mechanism of cryptographic one-to-many reversible mapping between two domains and it's applications. …”
Get full text
Get full text
Get full text
Get full text
-
11
-
12
Mobile technology generations and cryptographic algorithms: analysis study
Published 2016“…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. The study based on some factors like features, services, standards, and techniques which have adopted in these generations.…”
Get full text
Get full text
Get full text
-
13
-
14
Personalised cryptographic key generation based on FaceHashing
Published 2004“…In the second stage, FaceHash is then securely reduced to a single cryptographic key via Shamir secret-sharing. Tokenised FaceHashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factor. …”
Get full text
Get full text
-
15
Entanglement, Einstein-Podolsky-Rosen steering and cryptographical applications
Published 2016“…We define an indicator of collective steering-type correlations, which is interpreted operationally in terms of the guaranteed secret key rate in the multi-party cryptographic task of quantum secret sharing. The final results look at the cryptographical task of quantum secret sharing, whose security has remained unproven almost two decades after its original conception. …”
Get full text
-
16
-
17
-
18
Cryptographic hash function: A high level view
Published 2013“…Cryptographic hash function verifies data integrity and sender identity or source of information. …”
Get full text
Get full text
-
19
A review of cloud security based on cryptographic mechanisms
Published 2014“…Furthermore, solutions suggested by some researchers are presented with a focus on cryptographic techniques that approve secure cloud storage.…”
Get full text
Get full text
-
20
Analysable Chaos-based Design Paradigms For Cryptographic Applications
Published 2024“…This study proposes simple and analyzable paradigms based on well-established cryptographic principles (SPN and Feistel) to address these issues. …”
Get full text
Get full text