Cryptography最新文献

筛选
英文 中文
Block Ciphers and Stream Ciphers 分组密码和流密码
IF 1.6
Cryptography Pub Date : 2018-08-14 DOI: 10.1201/9781315282497-4
Douglas R Stinson, Maura B. Paterson
{"title":"Block Ciphers and Stream Ciphers","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-4","DOIUrl":"https://doi.org/10.1201/9781315282497-4","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44978802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and Evaluation of Steganography Based Online Voting System 基于隐写术的在线投票系统的实现与评价
IF 1.6
Cryptography Pub Date : 2016-07-01 DOI: 10.4018/978-1-7998-1763-5.ch023
IssacBiju, RuraLauretha, H. Kumar
{"title":"Implementation and Evaluation of Steganography Based Online Voting System","authors":"IssacBiju, RuraLauretha, H. Kumar","doi":"10.4018/978-1-7998-1763-5.ch023","DOIUrl":"https://doi.org/10.4018/978-1-7998-1763-5.ch023","url":null,"abstract":"Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70442788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings 一种基于配对的多用户同态加密方案
IF 1.6
Cryptography Pub Date : 2016-04-01 DOI: 10.4018/IJTHI.2016040106
Wei Zhang
{"title":"A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings","authors":"Wei Zhang","doi":"10.4018/IJTHI.2016040106","DOIUrl":"https://doi.org/10.4018/IJTHI.2016040106","url":null,"abstract":"A new method is presented to privately outsource computation of different users. As a significant cryptographic primitive in cloud computing, homomorphic encryption HE can evaluate on ciphertext directly without decryption, thus avoid information leakage. However, most of the available HE schemes are single-user, which means that they could only evaluate on ciphertexts encrypted by the same public key. Adopting the idea of proxy re-encryption, and focusing on the compatibility of computation, the authors provide a pairing-based multi-user homomorphic encryption scheme. The scheme is a somewhat homomorphic one, which can do infinite additions and one multiplication operation. Security of the scheme is based on subgroup decision problem. The authors give a concrete security model and detailed security analysis.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2016-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/IJTHI.2016040106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70471345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Identification Schemes and Entity Authentication 识别方案和实体认证
IF 1.6
Cryptography Pub Date : 2005-11-01 DOI: 10.1201/9781420057133-12
Douglas R Stinson
{"title":"Identification Schemes and Entity Authentication","authors":"Douglas R Stinson","doi":"10.1201/9781420057133-12","DOIUrl":"https://doi.org/10.1201/9781420057133-12","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65964099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Agreement Schemes 主要协议方案
IF 1.6
Cryptography Pub Date : 2005-11-01 DOI: 10.1201/9781420057133-14
Douglas R Stinson
{"title":"Key Agreement Schemes","authors":"Douglas R Stinson","doi":"10.1201/9781420057133-14","DOIUrl":"https://doi.org/10.1201/9781420057133-14","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65964113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The RSA Cryptosystem and Factoring Integers RSA密码系统与整数分解
IF 1.6
Cryptography Pub Date : 2005-11-01 DOI: 10.1201/9781420057133-8
Douglas R Stinson
{"title":"The RSA Cryptosystem and Factoring Integers","authors":"Douglas R Stinson","doi":"10.1201/9781420057133-8","DOIUrl":"https://doi.org/10.1201/9781420057133-8","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65964122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public-Key Cryptography and Discrete Logarithms 公钥密码学与离散对数
IF 1.6
Cryptography Pub Date : 2005-11-01 DOI: 10.1201/9781420057133-9
Douglas R Stinson
{"title":"Public-Key Cryptography and Discrete Logarithms","authors":"Douglas R Stinson","doi":"10.1201/9781420057133-9","DOIUrl":"https://doi.org/10.1201/9781420057133-9","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65964168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信