Search Results/Filters    

Filters

Year

Banks



Expert Group




Full-Text


Author(s): 

CHEN P.S. | HWANG S.A. | WU C.W.

Issue Info: 
  • Year: 

    1996
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    408-411
Measures: 
  • Citations: 

    1
  • Views: 

    103
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 103

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    3
Measures: 
  • Views: 

    169
  • Downloads: 

    277
Abstract: 

CIRCULANT MATRICES (CM) IMPLY AN IMPORTANT DESIGNATION IN CRYPTOGRAPHY. AN IMPORTANT ASPECT IN PUBLIC KEY CRYPTOGRAPHY IS USING CM SUCH THAT GIVEN A 𝑛∗𝑛 CM "𝐶" OVER A FIELD 𝐹 WE CALCULATE EXPONENT OF IT A=𝐶𝑟 WHERE R IS AN ARBITRARY INTEGER NUMBER THEN A IS A PUBLIC KEY TO ENCRYPT OUR DATA. THE AIM OF THIS PAPER IS TO INTRODUCE AN ALGORITHM TO FIND SUCH CMS WHICH ARE SUITABLE IN SECURITY FIELD. IT MEANS THOSE CMS ARE NOT ONLY STRONG AGAINST ATTACKS IN PRACTICE BUT ALSO THEY ARE FAST ENOUGH IN COMPUTATIONAL POINT OF VIEW. MOREOVER, IT PROPOSES A NEW cryptosystem TO PUBLIC KEY CIPHER WHICH SECRET KEY IS AN ARBITRARY INTEGER 𝑚 AND A CIRCULANT MATRIX 𝐶 WITH FIELD ELEMENTS AND AN EXTENSION OF THE SAME MATRIX TO POWER OF SAME SECRET KEY IS USED AS A PUBLIC KEYS. THIS cryptosystem IS AN ASYMMETRIC ENCRYPTION ALGORITHM RESISTANT TO THE ATTACK OF ALL KNOWN PLAINTEXT.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 169

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 277
Author(s): 

ZHANG C.N. | YUN D.Y.Y.

Issue Info: 
  • Year: 

    1988
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    341-350
Measures: 
  • Citations: 

    1
  • Views: 

    131
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 131

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    1
Measures: 
  • Views: 

    144
  • Downloads: 

    94
Abstract: 

IT HAS BECOME CRITICAL TO PROTECT BIOMETRIC TEMPLATES IN THE CURRENT BIOMETRIC COMMUNITY. FUZZY VAULT IS A PROMISING AND APPLICABLE SCHEME, WHICH CAN PROTECT BIOMETRIC TEMPLATES. ALSO IT CAN PERFORM SECURE KEY MANAGEMENT. ALIGNMENT OF THE TEMPLATE BIOMETRIC SAMPLE AND THE QUERY BIOMETRIC SAMPLE IN THE ENCRYPTED DOMAIN REMAINS A CHALLENGING TASK. IN THIS PAPER, WE PROPOSE AN ALIGNMENT-FREE cryptosystem BASED ON MULTIPLE FUZZY VAULTS. IN PROPOSED METHOD, IN REGISTRATION PHASE, MULTIPLE VAULTS CONSTRUCT FOR ONE FINGERPRINT AND IN VERIFICATION PHASE, IF AT LEAST TWO OF THE VAULTS DECODED SUCCESSFULLY BY THE QUERY FINGERPRINT, THE SECRET WILL BE RECOVERED. EXPERIMENTS ON FVC2002-DB2A AND FVC2002-DB1A ARE CONDUCTED TO SHOW THE PROMISING PERFORMANCE OF THE PROPOSED FINGERPRINT cryptosystem. ...

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 144

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 94
Issue Info: 
  • Year: 

    2018
  • Volume: 

    10
  • Issue: 

    1
  • Pages: 

    45-53
Measures: 
  • Citations: 

    0
  • Views: 

    256
  • Downloads: 

    177
Abstract: 

In this paper we present a new finite field-based public key cryptosystem (NETRU) which is a non-commutative variant of CTRU. The original CTRU is defined by the ring of polynomials in one variable over a finite fieldF2. This system works in the ring R=F2 [x]/áxN-1ñ and is already broken by some attacks such as linear algebra attack. We extend this system over finite fields Zp, wherep is a prime (or prime power) and it operates over the non-commutative ring M=Mk (Zp) [T, x]/áXn-Ik*kñ, where M is a matrix ring of k by k matrices of polynomials in R=Zp [T, x]/áxn -1ñ. In the proposed NETRU, the encryption and decryption computations are non-commutative and hence the system is secure against linear algebra attack as lattice-based attacks. NETRU is designed based on the CTRU core and exhibits high levels of security with two-sided matrix multiplication.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 256

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 177 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1999
  • Volume: 

    7
  • Issue: 

    2
  • Pages: 

    280-284
Measures: 
  • Citations: 

    1
  • Views: 

    103
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 103

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Kordestani Mona

Journal: 

Issue Info: 
  • Year: 

    621
  • Volume: 

    3
  • Issue: 

    11
  • Pages: 

    80-97
Measures: 
  • Citations: 

    0
  • Views: 

    21
  • Downloads: 

    11
Abstract: 

This paper presents a novel image cryptosystem using a specific feature of boundary elementary cellular automata with permutation-diffusion architecture. The characteristics of some periodic boundary elementary cellular automata (CAs) with the length of 8 have been studied over the past years. The State-transition diagram shows that some elementary cellular automata (ECA) rule lead to some state attractors that are suitable to use to implement an encrypting function in order to transform the pixels’ values while meeting the basic requirements of the encryption scheme. Minimizing computational overhead, the production of these attractors could be done by using an initial global state of the CA solely, and the implementation of which needs no extra hardware cost. Correspondingly, the proposed new image cryptosystem includes an encryption method based on both permutations of the image pixels and the replacement of the pixel values. The permutation method is optional and can be done by every permutation algorithm. Simulation results revealed this fact that the proposed CA-based image cryptosystem shows strong performance in terms of encryption and decryption. The outstanding characteristics of the proposed image encryption method are as follows: lossless and symmetric private key encryption, low data expansion, the possibility of encryption when there is more than one image with the use of just one key image, large keyspace, and checking data integrity.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 21

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 11 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

REZAI A. | KESHAVARZI P.

Issue Info: 
  • Year: 

    2011
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    1323-1327
Measures: 
  • Citations: 

    1
  • Views: 

    123
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 123

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    46
Measures: 
  • Views: 

    123
  • Downloads: 

    153
Abstract: 

THE EXISTING SECRET SHARING SCHEMES EITHER REQUIRE INTEGER NUMBERS OR REQUIRE DLP (DISCRETE LOGARITHM PROBLEM) FOR VERIFICATION. IN ADDITION, THEY USE SECURE CHANNEL FOR TRANSMISSION OF SECRET. IN THIS PAPER WE PRESENT A (N, N)-THRESHOLD SECRET SHARING SCHEME USING AD cryptosystem THROUGH INSECURE CHANNEL IN WHICH THE FLOATING NUMBERS CAN BE USED. THE PROPOSED SCHEME DOESN’T NEED DLP FOR VERIFICATION. IN ADDITION, IT IS SECURE AGAINST QUANTUM ALGORITHMS.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 123

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 153
Issue Info: 
  • Year: 

    2013
  • Volume: 

    1
  • Issue: 

    2
  • Pages: 

    119-129
Measures: 
  • Citations: 

    0
  • Views: 

    421
  • Downloads: 

    223
Abstract: 

This paper presents a new and efficient implementation approach for the elliptic curve cryptosystem (ECC) based on a novel finite field multiplication in GF (2m) and an efficient scalar multiplication algorithm. This new finite field multiplication algorithm performs zero chain multiplication and required additions in only one clock cycle instead of several clock cycles. Using modified (limited number of shifts) Barrel shifter, the partial result is also shifted in one clock cycle instead of several clock cycles. Both the canonical recoding technique and the sliding window method are applied to the multiplier to reduce the average number of required clock cycles. In the scalar multiplication algorithm of the proposed implementation approach, the point addition and point doubling operations are computed in parallel. The sliding window method and the signed-digit representation are also used to reduce the average number of point operations. Based on our analysis, the computation cost (the average number of required clock cycles) is effectively reduced in both the proposed finite field multiplication algorithm and the proposed implementation approach of ECC in comparison with other ECC finite field multiplication algorithms and implementation approaches.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 421

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 223 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 14
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button