SEARCH ENGINEERING RESEARCH PAPERS

cryptography research papers 2015



Discrete Logarithm Based Cryptography with Abelian Varieties
free download

Abstract In recent years there has been increased interest in public key cryptography utilizes the group of points on elliptic curves. In this report we develop notions central to cryptography using elliptic curves and generalize thess ideas to hyperelliptic curves. A

Advanced ASCII Based Cryptography Using Matrix Operation, Palindrome Range, Unique id
free download

Abstract:Cryptography is only thanks to succeed information security. This is often done by changing the info into cipher text. The existing manner of doing this was victimization Armstrong range. Since there square measure few Armstrong numbers so a crypt-analyst

Modified Cooley-Tukey FFT method for Polynomial Multiplication in Lattice Cryptography
free download

Abstract. A new viewpoint on designing a finite-field multiplier architecture is suggested. The proposed architecture trades decrease in the number of clock cycles with not as much additional hardware area. The architecture presents high performance, succinct structure,

New Designs for Friendly Visual Cryptography Scheme
free download

Abstract:Different from conventional cryptography, visual cryptography is an image cryptographic technique proposed by Naor and Shamir. It encodes a secret image into n pieces of noise-like shares. When k or more than k pieces of shares are gathered from

Algorithmic Problems of Group Theory, Their Complexity, and Applications to Cryptography
free download

This volume consists of contributions by participants and speakers in special sessions at two AMS meetings. These special sessions concerned algorithmic problems of group theory, their complexity, and applications to cryptography. The AMS Special Session on

Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
free download

Abstract. As new technologies emerge such as wearables, it opens up for new challenges, especially related to security and privacy. One such recent technology is smart glasses. The use of glasses introduces security and privacy concerns for the general public but also for

Binary Visual Cryptography Scheme for Cheating Prevention
free download

Abstract:Visual cryptography, is a scheme that divides a secret image into several shares, Many researches about visual secret sharing and its applications have been recently proposed. Unfortunately, the cheating attack in which evil participants cheat the honest A vascular biometric image format standard is useful for the exchange of vascular biometric image information across different systems developed by multiple organizations. As one part of this standardization effort, the International Standard Organization (ISO) has published

A Research on Enhancing Public Key Cryptography by The Use of MRGA with RSA and N-Prime RSA
free download

Abstract In current scenario everything is being transferred on the web and other communication medium. So that we need to make our data secure from all other attacker and unauthorized person. So that we have to give lot of protection to the transmitting data.

Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
free download

Abstract We describe a new technique for conducting partitioning arguments. Partitioning arguments are a popular way to prove the security of a cryptographic scheme. For instance, to prove the security of a signature scheme, a partitioning argument could divide the set of The 2015 Theory of Cryptography Conference (TCC) was held at the Sheraton Warsaw Hotel in Warsaw, Poland, during March 23–25. TCC 2015 was sponsored by the International Association for Cryptologic Research (IACR). The general chair of the

Review on Network Security and Cryptography
free download

Abstract With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe transmission of

Novel Approach for Visual Cryptography Using Adaptive Local Filter
free download

Abstract: Visual Cryptography Scheme is an encryption method that is used to encode secret written materials into an image and encode this image into n share images. The decoding only requires only selecting some subset of these n images, making transparencies of LightSec 2014 is the Third International Workshop on Lightweight Cryptography for Security and Privacy, which was held in Eminönü, Istanbul, Turkey, during September 1–2, 2014. The workshop was sponsored by TÜBITAK BILGEM UEKAE (The Scientific and Technological

RNS Arithmetic Approach in Lattice-based Cryptography
free download

Conclusions about new acceleration technique vs RNS-MRS approach depends on basis R; worst-case: detR ù case RNS-MRS BI replaced by :-50% precomputations,-55/60% elementary modular multiplications (no more RNS-to-MRS conv.) fast RNS base

A Cryptography Inclusive Effective Handoff Model for Optimizing Handoff in WPAN
free download

Abstract:WPAN is restricted area network defined with energy limits and sensing limits. This network form is defined under controller devices. As the nodes moves outside the controller range, the handoff is performed. To optimize the communication and network

Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
free download

ABSTRACT Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely with each other without trusting a third-party intermediary. In the event of contractual breaches or aborts, the decentralized blockchain

MOBILE PAYMENTMETHODBASED ON PUBLIC-KEY CRYPTOGRAPHY
free download

ABSTRACT Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash, cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is summarized in three processes: firstly, the

Cryptography for Parallel RAM via Indistinguishability Obfuscation
free download

Abstract Since many cryptographic schemes are about performing computation on data, it is important to consider a computation model which captures the prominent features of modern system architecture. Parallel random access machine (PRAM) is such an abstraction

Multivariate Public Key Cryptography
free download

Page 1. Multivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar Christian Eder, Jean-Charles Faug`ere and Ludovic Perret June 25, 2015 1 / 36 Page 2. 1 Introduction to public key cryptography 2 Construction of MPKC

A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms
free download

ABSTRACT: Data security is very important in wireless network and for this cryptography plays a crucial role which means secret writing. In Cryptography encryption decryption of data is done by using secret key to provide data confidentiality, data integrity and data

Multilevel Network Security Combining Cryptography and Steganography on ARM Platform
free download

Abstract This paper presents two level data security in Network system. Cryptographic algorithm BLOWFISH and Steganography algorithm List significant Bit (LSB) are used for data security. Confidential information is encrypted by BLOWFISH algorithm, and then

Secure E-marketing Using Steganography Emergence of Cryptography
free download

Abstract-Traditional selling goods is possible to do electronically because of certain software programs that run the main functions of an E-commerce including product display online ordering and inventory management. E-commerce includes business activities that are

Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
free download

Abstract The significance of digital information security has been enhanced due to the boost of internet communication. Providing security for server client communication over the internet is a critical issue due to open world digital eavesdroppers. Generally, password

A Review of Public Key Cryptography for Secure Communication Using RSA
free download

Abstract-An asymmetric encryption scheme is just like a symmetric encryption scheme except for an asymmetry in the key structure. The key pk (public key) used to encrypt is different from the key sk (secret key) used to decrypt message. Secure communication

Network Security with Cryptography
free download

Abstract: Network Security Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of

Suspicious Email Detection System via Triple DES Algorithm: Cryptography Approach
free download

Abstract: The paper presents a suspicious email detection System which detect suspicious activities. In the paper we proposed the use of cryptography strategies for terrorists email detection. Security plays a very important and crucial role in the field of Internet and for

Cryptography and Image Steganography Using Dynamic Encryption on LSB and Color Image Based Data Hiding
free download

Abstract: Cryptography and steganography are two conventional techniques used to cipher or hide information or data in existing communication. Cryptography is the art of saving information by encrypting it into an obscure format. On the other hand, steganography is

Securing Android Code Using White Box Cryptography and Obfuscation Techniques
free download

ABSTRACT: Code obfuscation is a set of program transformations that make program code and program execution difficult to analyze. First of all, obfuscation hinders manual inspection of program internals. By renaming variables and functions, and breaking down structures,

CRYPTOGRAPHY IN THE AGE OF QUANTUM COMPUTERS
free download

Abstract It is well established that full-fledged quantum computers, when realized, will completely break many of today's cryptosystems. This looming threat has led to the proposal of so-called postquantum systems, namely those that appear resistant to quantum

Visual Cryptography and Steganography: A Review
free download

Abstract: To maintain the privacy and certainty of pictures may be a spirited space of analysis, with two totally different approaches being followed, the primary being encrypting the pictures through encoding algorithms using keys, the secondary approach involves

N/2-BIT PARALLEL LFSR FOR CRYPTOGRAPHY
free download

ABSTRACT The FPGA based implementation of N/2-bit parallel LFSR Pseudo Random Sequence generator is presented in this paper that can be used in cryptography and Circuit testing, cryptography, where low memory utilization and low level of security is required.

An Operational Characterization of the Notion of Probability by Algorithmic Randomness and Its Application to Cryptography
free download

Abstract: The notion of probability plays an important role in almost all areas of science, including cryptography. In modern mathematics, however, probability theory means nothing other than measure theory, and the operational characterization of the notion of probability

Routing Algorithm using DNA Cryptography in MANET
free download

Abstract-MANET is collection of nodes with wireless communication and networking capability that communicates with each other without any centralized node as it is infrastructure less. Due to mobility and limited radio range, every node has to perform the

Understanding Steganography over Cryptography and Various Steganography Techniques
free download

Abstract: This paper is all about the study of the steganography and techniques used for the steganography. Firstly we will understand the term steganography, use of steganography and techniques used for the steganography. In steganography, we use text transformation,

Comparative Analysis of Cryptography Cipher Techniques
free download

Abstract In today's scenario, Information Security is the most challenging aspects in the web and network application. Internet and network applications are growing fast. So the value and importance of the exchanged data over the internet or other type of media are

Secure Authentication Using Visual Cryptography
free download

Abstract-Visual Cryptography is a cryptographic technique which allows visual information (text, picture, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. Visual Cryptography deals with any type of

A Hybrid Geometric Cryptography Approach to Enhance Information Security
free download

Abstract It is widely recognized and accepted that data security will play a crucial and critical role in modern times for businesses will be transacted over the Internet through e- commerce and mcommerce channels. To address these security concerns, various

SURVEY ON SECURITY ARCHITECTURE BASED ON ECC (ELLIPTIC CURVECRYPTOGRAPHY) IN NETWORK
free download

Abstract Cryptography is the technique of hiding message in some unintelligible format so that the message lies hidden in plain sight of an unintended person. Public key cryptography offers a wide range of security over the various modes of transferring data, especially over

A Novel Method to Protect Content of Microsoft Word Document Using Cryptography and Steganography
free download

Abstract:Microsoft Word is the most famous and popular word processor in the world nowadays and the last versions of it depend on eXtended Markup Language (XML) by using Open Office XML format (OOXML). Usually MS Word document contain sensitive data, this

Digital Image Sharing Using Visual Cryptography Techniques
free download

Abstract:Conventional visual secret sharing (VSS) schemes hide secret images in shares that are either printed on transparencies or are encoded and stored in a digital form. The shares can appear as noise-like pixels or as meaningful images; but it will arouse

EA-ISP-016-Cryptography Policy
free download

This policy forms part of the University's Information Security Policy Set and should be read in conjunction with the Information Security Policy (EA-ISP-001) and other supporting documentation, including the Enterprise Architecture Policy surrounding Encryption (EA-

A Stroke concealed point method with integrated approach of Asymmetric Cryptographyand Steganography
free download

Abstract-For information and computer security passwords are used. Commonly used passwords are alphanumeric passwords, which are combination of alphabets, numbers and some special characters. These types of passwords are vulnerable to various attacks. To

Report on Pairing-based Cryptography
free download

Recently, pairings on elliptic curves have been a very active area of research in cryptography. Pairings map pairs of points on an elliptic curve into the multiplicative group of a finite field. Their unique properties have enabled many new cryptographic protocols that

Optimized Cryptography with ECC Integrated Encryption Scheme
free download

Abstract In this paper, we have a tendency to describe the cryptographic ways and planned an optimized technique for cryptography. A lot of analysis are carried publically key cipher rather than stream based mostly cipher in order that to produce high security. We've got

Image Encryption Decryption with Symmetric Key Cryptography using MATLAB
free download

Abstract Any communication in the language that you and I speak that is the human language, takes the form of plain text or clear text. That is, a message in plain text can be understood by anybody knowing the language as long as the message is not codified in

Enhancing the Security of Identity and Access Management in Cloud Computing using Elliptic Curve Cryptography
free download

Abstract:loud computing is the new technology that aims to provide software, hardware, bandwidth, and virtualized resources on demand via the internet based on the principle of pay per use. There are many challenges that facing the cloud computing, one of the main

An Intrusion Detection System for MANET using Hybrid Cryptography
free download

Abstract: Over the decade, security has become a most important issue in Mobile Adhoc Network compared to other networks, MANETs are more weak to the various types of attacks. In this case the detection should be focused as another part before an attacker

A Novel Steganographic Approach Using Visual Cryptography Concepts
free download

Abstract: Due to the rapid development of the internet communication huge quantity of information is transmitted over the internet. To share some of the important information like password, confidential information, security codes etc. we requires a bit higher level

Adoption of Hybrid Cryptography in an Acknowledgement Based Intrusion Detection System for Manets
free download

ABSTRACT Mobile ad hoc network consists of mobile nodes where network topology and administrative domain membership can change rapidly. Thus it is important to provide security services such as network availability, confidentiality and integrity. In this paper, we

A Framework for Using Cryptography for DNS Security
free download

Abstract: DNS, Domain Name System is a protocol that resolves hostnames to IP Addresses over the Internet. DNS, being an open source, it is less secureand it has no means of determining whether domain name data comes from an authorised domain owner. So,

Secure Data Communication using Cryptography and Steganography Standards
free download

ABSTRACT In the today's world, security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. RSA

Quantum Key Distribution by Exploitation Public Key Cryptography (ECC) In Resource Constrained Devices
free download

ABSTRACT Quantum Cryptography uses the laws of quantum physics for communication, offers an unconditionally secure solution to the key distribution problem. Moreover quantum mechanics also provides the ability to detect the presence of eavesdropper who is trying Abstract. Pairings are typically implemented using ordinary pairingfriendly elliptic curves. The two input groups of the pairing function are groups of elliptic curve points, while the target group lies in the multiplicative group of a large finite field. At moderate levels of

SECURE BASED ROUTING PROTOCOL WITH CRYPTOGRAPHY DATA ENCRYPTION TECHNIQUE FOR MANET
free download

Abstract Mobile Ad hoc Networks are deployed in many new domestic and public applications, rising to new requirements in terms of performance and efficiency. However due to their nature, some usual network services as routing and security are not carried

Increasing the Security of SCADA Systems using Key Management and Hyperelliptic CurveCryptography
free download

Abstract A SCADA system operates as a control center of a central termination which receives information from one or more remote terminals and issues commands to them. To increase the security of systems encryption can be used to protect data transfer and

Certificateless Public Key Cryptography
free download

Abstract Certificateless public key cryptography is a model of public key cryptography that, while similar, avoids the escrow of identity-based public key cryptography while not relying on the use of certificates to guarantee the authenticity of keys. The intent of this paper is to

Architectural Framework of Image Cryptography By Hybrid Approach of Logistic Map and Cheat Image
free download

Abstract:This paper proposes a novel confusion and diffusion algorithm for image encryption based on logistic map and cheat image. We choose the initial condition and control parameter of logistic map as the secret key. The cheat image selected from the

A Secured Text Transmission Through Video Using Modified Status Bit LSB along With RSACryptography
free download

Abstract:Using steganography techniques the data can be hidden inside a cover media such as text, audio, video, and image. In the proposed technique, a new steganography technique is being developed to hide large data in Bitmap image using filtering based

Improving RGB Data Security with Advance Cryptography Algorithm
free download

Abstract: Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer

Why cryptography should not rely on physical attack complexity
free download

Abstract Ever since the first side channel attacks and fault attacks on cryptographic devices were introduced in the mid-nineties, new possibilities of physical attacks have been consistently explored. The risk that these attacks pose is reduced by reacting to known

Problems, solutions and experience of the first international student's Olympiad incryptography
free download

A detailed overview of the problems, solutions and experience of the first international student's Olympiad in cryptography, NSUCRYPTO'2014, is given. We start with rules of participation and description of rounds. All 15 problems of the Olympiad and their

Cryptography over the elliptic curveEa, b (A3) This work
free download

PII: S1658-3655(15)00026-6 DOI: http://dx.doi.org/doi:10.1016/j.jtusci.2015.02.005 Reference: JTUSCI 147 Received date: 28-9-2014 Revised date: 6-2-2015 Accepted date: 7-2-2015 Please cite this article as: Abdelhamid Tadmori, Abdelhakim Chillali, M'

Security of Genus 3 Curves in Cryptography
free download

The Discrete Logarithm Problem (DLP) in the abelian group E(Fp) of Fp-valued points on an elliptic curve E/Fp has been successfully used as a building block for a wide variety of both public key encryption schemes and digital signature schemes. Since the size of E(Fp) is roughly

Role of Threshold Cryptography in Securing MANETs
free download

Abstract Distributed environments are becoming more popular as these technologies such as Mobile and Ad hoc networks, aim to enable a large scale cooperation for resource sharing framework. Secure authentication is the challenging issue for such environments.

On Boolean functions, symmetric cryptography and algebraic coding theory
free download

This thesis is divided into two main parts. In the first part we report the work done with my supervisor Massimiliano Sala and in the second the work done jointly with Eimear Byrne, coming from a collaboration started during a period of research at University College

A Secured Cloud Security Using Elliptic Curve Cryptography
free download

Cloud Computing is a modern paradigm which enables utilization of pool of computing resources in the most proficient way. This emerging technology provides great

Study on the Safety Application of Public Key Cryptography in Electronic Commerce
free download



Projects in Cryptography, Codes, and Information Security sm473 class notes
free download



An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
free download

Abstract. Elliptic Curve Cryptography (ECC) is a popular tool to construct public-key crypto- systems. The security of ECC is based on the hardness of the elliptic curve discrete logarithm problem (ECDLP). Implementing and analyzing the performance of the best

RRAM-based PUF: Design and Applications in Cryptography
free download

ABSTRACT The recent flurry of security breaches have raised serious concerns about the security of data communication and storage. A promising way to enhance the security of the system is through physical root of trust, such as, through use of physical unclonable

Anti-Phishing Image Captcha Validation Scheme using Visual Cryptography
free download

ABSTRACT Evolution in the world of internet has given rise to several online attacks and the most common attack is phishing. Victims are tricked into providing such information by a combination of spoofing techniques and social engineering. Phishing is an attempt by an

A Bibliography of Publications on Cryptography: 1990–1999
free download



SECURED IMAGE TRANSFER THROUGH DNA CRYPTOGRAPHY USING SYMMETRIC CRYPTOGRAPHIC ALGORITHM
free download

Information security has become crucial and it is getting difficult to secure the information using traditional methods. Internet and network applications are growing very fast, so that the needs to protect such applications are increased by using cryptographic methods. As

Steganography and Cryptography Inspired Enhancement of Introductory Programming Courses
free download

Abstract Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the

REVERSIBLE WATERMARKING FOR DIGITAL IMAGES USING VISUAL CRYPTOGRAPHY AND PIXEL HISTOGRAM SHIFTING
free download

Abstract: There is a rapid growth in Internet technology so information can be exchanged quickly and easily over web. This information includes images, videos, audios and documents. Medical and military images have sensitive contents, for which any

VLSI IMPLEMENTATION OF NOVEL ROUND KEYS GENERATION SCHEME FORCRYPTOGRAPHY APPLICATIONS BY ERROR CONTROL ALGORITHM
free download

Abstract A novel implementation of code based cryptography (Cryptocoding) technique for multi-layer key distribution scheme is presented. VLSI chip is designed for storing information on generation of round keys. New algorithm is developed for reduced key size


FREE ENGINEERING RESEARCH PAPERS