-
4061
Secure channel free public key encryption with multiple keywords search
Published 2020“…With a further exploration of modern cryptography, people realize that Public Key Infrastructure (PKI) is not perfect but has its limitations. …”
Get full text
Thesis -
4062
On the Thermal Models for Resistive Random Access Memory Circuit Simulation
Published 2021-05-01“…Resistive Random Access Memories (RRAMs) are based on resistive switching (RS) operation and exhibit a set of technological features that make them ideal candidates for applications related to non-volatile memories, neuromorphic computing and hardware cryptography. For the full industrial development of these devices different simulation tools and compact models are needed in order to allow computer-aided design, both at the device and circuit levels. …”
Get full text
Article -
4063
A Comparative look to the Recall method of Personality of Halaj in the poem Shafi'ee kadkani and Salah Abdul Sabour
Published 2020-02-01“…Thirdly, it is intended in the playful spirits of the playwright's spirits and avoids poetic artifacts, but in the non-visual poetry in which the mask is used, ambiguity and cryptography is a literary value. The ambiguity, "is the essence of pure and enduring literature, and for the literary context, value and virtue." …”
Get full text
Article -
4064
More Constructions of Light MDS Transforms Based on Known MDS Circulant Matrices
Published 2022-07-01“…Maximum distance separable (MDS) codes have the maximum branch number in cryptography, and they are generally used in diffusion layers of symmetric ciphers. …”
Get full text
Article -
4065
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
Published 2022-01-01“…However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pairing cryptography. Many shared secret protocols have been proposed using polynomial evaluation and interpolation to solve the previous complexity issues. …”
Get full text
Article -
4066
Modern Interactive Proofs
Published 2022“…Non-signaling proofs, have found applications in cryptography and hardness of approximation. An important open problem is characterizing the power of non-signaling proofs. …”
Get full text
Thesis -
4067
Fractal coding of bio-metric image for face authentication
Published 2021“…This thesis examines how fractal image coding is used in biometric cryptography for personal face authentication. This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
Get full text
Thesis -
4068
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…These challenges are: 1) single point failure in the cryptography scheme, 2) key abuse problem in the key generating process, and 3) delayed access to the data in the cloud for the user. …”
Get full text
Thesis -
4069
Fundamentals of Color Symbolization in Shia and Sunni Theosophy and the Application Patterns in Shia and Sunni Monastery-mausoleums in Iran (Focusing on Monastery-mausoleums of th...
Published 2021-12-01“…In fact, in the case of color interpretation, a kind of cryptography must be used. Decoding the secrets of colors and their interpretations throughout our visual world, including the nature as well as manmade symbols would be possible through the religious knowledge enclosed in the hearts of the sages and mystics. …”
Get full text
Article -
4070
Locally Decodable Codes and Private Information Retrieval Schemes
Published 2008Get full text
Thesis -
4071
Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems: ICETIS 2022 Volume 1 /
Published 2023Get full text
software, multimedia -
4072
-
4073
Sequences over Finite Fields Defined by OGS and BN-Pair Decompositions of <i>PSL</i><sub>2</sub>(<i>q</i>) Connected to Dickson and Chebyshev Polynomials
Published 2023-02-01“…The factorization of groups into a Zappa–Szép product, or more generally into a <i>k</i>-fold Zappa–Szép product of its subgroups, is an interesting problem, since it eases the multiplication of two elements in a group and has recently been applied to public-key cryptography. We provide a generalization of the <i>k</i>-fold Zappa–Szép product of cyclic groups, which we call <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>O</mi><mi>G</mi><mi>S</mi></mrow></semantics></math></inline-formula> decomposition. …”
Get full text
Article -
4074
-
4075
l
Published 2023-03-01“…Examining the linguistic functions of the word "Ayeh" in various instances by using Jacobsen's communication model in semiotics proves common features such as having the occult aspect, reflection, and common referential function for cryptography…”
Get full text
Article -
4076
Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation
Published 2022-07-01“…Finally, by using symmetry or asymmetry cryptographies, our proposal will avoid MITM attacks that intercept the communication between legal nodes.…”
Get full text
Article -
4077
CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks
Published 2022-07-01“…The security and privacy concerns in vehicular communication are often faced with schemes depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the operations used by BP and EC are time-consuming and more complicated. …”
Get full text
Article -
4078
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. …”
Get full text
Get full text
Conference or Workshop Item -
4079
Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model
Published 2022-01-01“…In the past, numerous MRSC and AMRSC schemes based on various public-key cryptographies (i.e., public key infrastructure (PKI)-based, identity (ID)-based and certificateless (CL)) were proposed. …”
Get full text
Article