Advanced Cryptography Research Papers

  • 1.

    van Tilborg, H.C.A.: Encyclopedia of Cryptography and Security. Springer-Verlag New York, Inc., Secaucus (2005)MATHCrossRefGoogle Scholar

  • 2.

    Nedjah, N., de Macedo Mourelle, L.: A Versatile Pipelined Hardware Implementation for Encryption and Decryption Using Advanced Encryption Standard. In: Daydé, M., Palma, J.M.L.M., Coutinho, Á.L.G.A., Pacitti, E., Lopes, J.C. (eds.) VECPAR 2006. LNCS, vol. 4395, pp. 249–259. Springer, Heidelberg (2007)CrossRefGoogle Scholar

  • 3.

    Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners, 1st edn. Springer Publishing Company, Incorporated (2009)Google Scholar

  • 4.

    Burr, W.E.: Selecting the advanced encryption standard. IEEE Security and Privacy 1(2), 43–52 (2003)CrossRefGoogle Scholar

  • 5.

    Kilts, S.: Advanced FPGA Design: Architecture, Implementation, and Optimization. Wiley-IEEE Press (2007)Google Scholar

  • 6.

    Gomes, O., Moreno, R., Pimenta, T.: A fast cryptography pipelined hardware developed in FPGA with VHDL. In: The 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 1–6 (October 2011)Google Scholar

  • 7.

    Mijalli, M.H.A.: Efficient realization of S-Box based reduced residue of prime numbers using Virtex-5 and Virtex-6 FPGAs. American Journal of Applied Sciences 8(8), 754–757 (2011)CrossRefGoogle Scholar

  • 8.

    Dileep, A., Sekhar, C.: Identification of block ciphers using support vector machines. In: International Joint Conference on Neural Networks, IJCNN 2006, pp. 2696–2701 (2006)Google Scholar

  • 9.

    National Institute of Standards and Technology: FIPS PUB 46-3: Data Encryption Standard (DES) (October 1999),, supersedes FIPS 46-2

  • 10.

    Hoang, T., Nguyen, V.L.: An efficient FPGA implementation of the advanced encryption standard algorithm. In: IEEE RIVF International Conference on Computing and Communication Technologies, Research, Innovation, and Vision for the Future (RIVF), pp. 1–4 (March 2012)Google Scholar

  • 11.

    National Institute of Standards and Technology,

  • 12.

    Zambreno, J., Nguyen, D., Choudhary, A.: Exploring Area/Delay Tradeoffs in an AES FPGA Implementation. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol. 3203, pp. 575–585. Springer, Heidelberg (2004)CrossRefGoogle Scholar

  • 13.

    Wali, M.F., Rehan, M.: Effective coding and performance evaluation of the Rijndael Algorithm (AES). In: Student Conference on Engineering Sciences and Technology, SCONEST 2005, pp. 1–7 (August 2005)Google Scholar

  • 14.

    Tillich, S., Feldhofer, M., Popp, T., Großschädl, J.: Area, delay, and power characteristics of standard-cell implementations of the AES S-Box. Journal of Signal Processing Systems 50(2), 251–261 (2008)CrossRefGoogle Scholar

  • 15.

    Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.: Design and implementation of low-area and low-power AES encryption hardware core. In: The 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools, DSD 2006, pp. 577–583 (2006)Google Scholar

  • 16.

    Elumalai, R., Reddy, A.R.: Improving diffusion power of AES Rijndael with 8 ×8 MDS Matrix. International Journal of Scientific and Engineering Research 2(3) (March 2011)Google Scholar

  • 17.

    Rais, M.H., Qasim, S.M.: Efficient fpga realization of S-Box using reduced residue of prime numbers. International Journal of Computer Science and Network Security (IJCSNS) 10(1), 74–96 (2010)Google Scholar

  • 18.

    Huang, J., Seberry, J., Susilo, W.: A Five-Round Algebraic Property of the Advanced Encryption Standard. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 316–330. Springer, Heidelberg (2008)CrossRefGoogle Scholar

  • 19.

    Yenuguvanilanka, J., Elkeelany, O.: Performance evaluation of hardware models of advanced encryption standard (AES) algorithm. The IEEE Southeastcon, 222–225 (April 2008)Google Scholar

  • 20.

    Ghewari, P.B., Jaymala, M., Patil, K., Chougule, A.B.: Efficient hardware design and implementation of AES cryptosystem. International Journal of Engineering Science and Technology 2(3), 213–219 (2010)Google Scholar

  • 21.

    Thulasimani, L., Madheswaran, M.: A single chip design and implementation of aes-128/192/256 encryption algorithms. International Journal of Engineering Science and Technology 2(5), 1052–1059 (2010)Google Scholar

  • 22.

    Yin, H., Debiao, H., Yong, K., Xiande, F.: High-speed ASIC implementation of AES supporting 128/192/256 bits. In: International Conference on Test and Measurement, ICTM 2009, vol. 1, pp. 95–98 (December 2009)Google Scholar

  • 23.

    Liberatori, M., Otero, F., Bonadero, J., Castineira, J.: AES-128 cipher. high speed, low cost FPGA implementation. In: The 3rd Southern Conference on Programmable Logic, SPL 2007, pp. 195–198 (Febraury 2007)Google Scholar

  • 24.

    Rady, A., El Sehely, E., El Hennawy, A.: Design and implementation of area optimized AES algorithm on reconfigurable FPGA. In: Internatonal Conference on Microelectronics, ICM 2007, pp. 35–38 (December 2007)Google Scholar

  • 25.

    Siddeeq, Y.A., Ali, H.M.: AES cryptosystem development using neural networks. International Journal of Computer and Electrical Engineering (IJCEE) 3(2), 309–314 (2011)Google Scholar

  • 26.

    Albassal, A., Wahdan, A.M.: Neural network based cryptanalysis of a feistel type block cipher. In: International Conference on Electrical, Electronic and Computer Engineering, ICEEC 2004, pp. 231–237 (September 2004)Google Scholar

  • 27.

    Albassal, A., Wahdan, A.M.: Genetic algorithm cryptanalysis of a feistel type block cipher. In: International Conference on Electrical, Electronic and Computer Engineering, ICEEC 2004, pp. 217–221 (September 2004)Google Scholar

  • cryptography IEEE PAPER 2016

    Another Look at Tightness II: Practical Issues in Cryptography
    free download
    Abstract. How to deal with large tightness gaps in security proofs is a vexing issue in cryptography. Even when analyzing protocols that are of practical importance, leading researchers often fail to treat this question with the seriousness that it deserves. We

    Cryptography: A New Open Access Journal
    free download
    Cryptography has very long history, from ancient ciphers, such as Ceaser cipher, machine (or rotor) cipherx during WWI and WWII, and modern ciphers, which play a fundamental role in providing Confidentiality, Integrity, and Authentication services during transmission,

    Per-Session Security: Password-Based Cryptography Revisited
    free download
    Abstract. Cryptographic security is usually defined as some form of guarantee that holds except when a bad event with negligible probability occurs, and nothing is guaranteed in that case. However, in settings where such failure can happen with substantial probability,

    Secure Architectures of Future Emerging Cryptography
    free download
    Executive Summary This document describes the desired properties and features (requirements) for a suite of reusable, production quality software that implements lattice- based cryptography within the Horizon 2020 SAFEcrypto project. The document is mainly

    Public Key Cryptography Based Lossless and Reversible Data Hiding in Encrypted Images
    free download
    Abstract: For hiding secret data in digital images, large varieties of techniques are available, some are more complex than others. Public key cryptography has various useful applications and the technique employed depends on the requirements of the application

    Report on post-quantum cryptography
    free download
    Abstract In recent years, there has been a substantial amount of research on quantum computers�machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum

    Ensuring Authenticity and Revocability for Wireless Body Area Network using Certificateless Cryptography
    free download
    Abstract-Recently, with the technical advancements in wearable medical sensors and wireless communication techniques, Wireless Body Area Network (WBAN) has emerged as a new technology for e-health care service. The wearable medical device (WMD) aims at

    Minimalist Cryptography: Excerpt from an NSF Proposal
    free download
    Abstract This is part of a proposal submitted to NSF together with Allison Bishop Lewko in 2014 (and subsequently awarded). This part was written by Tal Malkin, influenced by discussions with various people (most notably Christina Brzuska, Siyao Guo, Igor Carboni

    Provably secure multi-server privacy-protection system based on chebyshev chaotic maps without using symmetric cryptography
    free download
    Abstract Most of the privacy-protection schemes adopting chaotic maps are usually by symmetric cryptography for guaranteeing identity hiding. This will lead to a high calculated amount. So, the paper will wipe out the symmetric cryptography, and only use chaotic

    free download
    Abstract:-Visual cryptography is the most efficient and secured methodology to provide the authentication for the user who are accessing the system. Banking system is extended with the visual cryptography which is used to provide the secured authentication for the users

    Secure Architectures of Future Emerging cryptography
    free download
    Executive Summary This report surveys the current state of the art in physical attacks and countermeasures for cryptographic devices and considers this in relation to the new class of lattice-based implementations. Although lattice-based primitives have been investigated

    Security at Its Finest: Overview of Cryptography Mechanisms
    free download
    Cryptography is the field of science which aims to construct systems that can withstand any abuse. The systems are designed in such a way that, even under malicious attacks, the systems can perform their functionalities without any security issues and without revealing

    Reliable Verified Internet Voting System based on Modified Elliptic CurveCryptography
    free download
    Abstract The election system is necessitating of every democracy and the administration formed is dependent on the results of the election. The election process paves the path for every voter to select a representative among themselves who can guide the democratic Nonlinear Boolean functions are necessary building blocks in cryptography; they often play a key role in the design of many stream ciphers and block ciphers. In the design of stream ciphers, nonlinear combining functions are an important type to study, where the

    Strengthening the Security Foundation of Cryptography With Whitewood's Quantum-Powered Entropy Engine
    free download

    Paper Reduction And Total Inter-Carrier Interference Cancelled Multiuser Detection In CFO Corrected CDMA-OFDM With Elliptic Curve Cryptography
    free download
    Abstract: The Code division multiple accesses with Orthogonal Frequency Division Multiple Modulation (CDMA-OFDM) system has been considered as a strong communication system for the next generation wireless communication performs excellent in noisy multipath

    Color Cryptography using Substitution method
    free download
    Abstract:In world of computer network, threats come in many different forms. Some of the most common threats today are software attacks. If we want to secure any type of data then we can use encryption technique. All traditional encryption techniques use substitution

    Anti-Phishing Frame-Work applying Visual Cryptography Mechanism
    free download
    Abstract In the present risky cyber technology era, network security plays a major role to solve the problems of network resources. Network security consists of services and facilities to prevent and monitor the unofficial access, wrong usage, alterations or denial of

    Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields
    free download
    Abstract Recent research in the field of lattice-based cryptography, especially on the topic of the ring-based primitive ring-LWE, provided efficient and practical ring-based cryptographic schemes, which can compete with more traditional number-theoretic ones. In the case of

    Efficient Lattice Reduction Algorithm and Cryptography
    free download
    Then L is called a lattice of dimension n, and B a basis. 2 Lattice-based cryptography has been paid attention as a candidate of post-quantum cryptography (ie still secure against attacks using quantum computing) application to encryption with high functionality (eg

    A study of digital currency cryptography for business marketing and finance security
    free download
    Abstract A medium of exchange is an intermediary used in trade or business to avoid the inconveniences of a pure barter system. While many things could be used as a medium of exchange in an economy, fiat money including currency bills and coins is the most

    A Review on Image Encryption Using DNA Based Cryptography Techniques
    free download
    Abstract: In today's period as the rate of information storage and transformation is rising day by day; so as information security is becoming more essential. Network security concerned with security which prevent data from misuse and modification. The Protection of

    Design and Implementation of Area Efficient Cellular Automata for EfficientCryptography
    free download
    ABSTRACT A novel cryptographic algorithm mainly depends on the cellular automata. In order to get the randomness using cellular automata concept. In this algorithm we have mainly concentrated on cellular automata module we have 8 different rules for different Abstract In this part we consider the problem of detecting deviations of binary sequence from randomness in details, because this problem is very important for cryptography for the following reasons. Random number (RNG) and pseudorandom number generators (

    FPGA Based Network Security Using Cryptography
    free download
    Abstract-Secured communication is most important thing in present day situation. Need of security is increasing rapidly. No one wants their data to be seen by others. Every individual wants their data to be secured and privacy must be maintained. This requirement can be

    Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography
    free download
    Abstract In this paper many technical terms about internet of things (IoT) have been discussed. Basically this paper deals with the concept of interconnection among billions of electronic devices through internet. As we know that internet is a network among different

    Darmstadt Technical University Cryptography and Computeralgebra February 23, 2016
    free download
    Abstract Formal verification is getting more and more important in computer science. However the state of the art formal verification methods in cryptography are very rudimentary. These theories are one step to provide a tool box allowing the use of formal

    A Usable Android Application Implementing Distributed Cryptography for Election Authorities
    free download
    Abstract: The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The e-voting promising the possibility of convenient, easy and safe way to capture and count the votes

    Secure Transactio: An Credit Card Fraud Detection System Using VisualCryptography
    free download
    Abstract-Today's world is Internet globe. Now a day popularity of E-commerce is increasing tremendously. Using E-commerce people do their financial deal online like online shopping etc. Most popular mode for online and offline payment is using credit card, use of credit

    A Survey Paper On Elliptic Curve Cryptography
    free download
    Abstract�Advanced Development in information and communication technologies, there are so many things that gives facility to deal with these technology using internet. For providing proper identification we using RFID (Radiofrequency identification) system. Radio-

    An Authenticate Cryptography based security model for handling multiple request from multiple devices for Mobile Cloud Computing
    free download
    Abstract: Mobile Cloud Computing (MCC) has revolutionized the way in which mobile endorsers across the globe leverage services on the go. MCC integrates cloud computing into the mobile environment and get over the obstacles related to performance (eg battery

    Service Orient Stream Cipher Based Key Management Scheme for Secure Data Access Control Using Elliptic Curve Cryptography in Wireless Broadcast
    free download
    Abstract: Wireless broadcast network has various services being transmitted in the network, which can be received by various users based on their registration and possession of the keys. There are many approaches has been discussed in the literature which suffers with

    Visual Cryptography and Steganography Techniques for Secure E-Payment System
    free download
    Abstract-In recent days there is rapid growth in online payment and E-Commerce market. Major factors that affects to customers in online shopping and payment are fraud in debit card or credit card and personal information security. personal Identity theft and phishing

    Cryptography: The Sciene of Secure Communication
    free download
    Abstract Day by day network and internet applications is becoming very popular. Sensitive information requires security and safety measures. Security is the most challenging aspect in the internet and network applications. Encryption algorithm provides the necessary

    A Review on Implementation of Message Authentication Scheme for Elliptic Curve Cryptography in Wireless Sensor Networks
    free download
    ABSTRACT Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either

    Advanced Cryptography Reading Assignment Pairing-based Cryptography
    free download
    The purpose of the following questions is to develop your knowledge and critical thinking on particular aspects of pairing-based cryptography. You are required to read the papers cited below and to prepare a 40 min group presentation answering all questions. The

    Advanced Cryptography Micro-projects
    free download
    The purpose of the following micro-projects is to develop your critical reading of the literature on a particular topic related to cryptography. You are required to choose one project in the list below and to prepare a 15 min presentation to the group on your findings

    Secret Key Sharing Using Homomorphic Commitments and its application to Threshold Cryptography
    free download
    Abstract In mobile ad hoc networks, the misbehaving nodes can cause dysfunction of the network resulting in the damage of other nodes. In order to establish secure communication with the group members of a network Threshold cryptography is employed, where a secret

    Advanced Cryptography Reading Assignment Lattice-based Cryptanalysis
    free download
    The purpose of the following questions is to develop your knowledge and critical thinking on particular topics related to lattice-based cryptanalysis. You are required to read the papers cited below and to prepare a 40 min group presentation answering all questions. The

    H-EAACK-An Intrusion Detection System Using Hybrid Cryptography for MANET
    free download
    Abstract-The migration to wireless network from wired network has been adopted in the past few decades. MANET, mobile ad-hoc network is one of the most important applications of wireless network. MANET is a continuously self-configuring, infrastructure-less network of

    Assured Data Communication Using Cryptography and Steganography
    free download
    Abstract:Now days in the world of communication, securing the information is Main criteria while communication in the network. Usually users exchange the confidential data and documents during communication. So, that Security is important criteria in Communication

    Secure Online Payment System using Visual Cryptography
    free download
    Abstract: With the commencement of internet E-Commerce is rapidly growing market. Phishing is most popular attack possible in E-commerce environment as Phishing means is the attempt to gain sensitive information of an user such as usernames, passwords, and

    Visual cryptography in internet voting for extended security
    free download
    Abstract:India has an asymmetric federal government, with elected officials at the federal, state and local levels. At the national level, the head of government, Prime Minister, is elected by members of the Lok Sabha, the lower house of the parliament of India. The

    Is the security of quantum cryptography guaranteed by the laws of physics
    free download
    Abstract. It is often claimed that the security of theoretical quantum key distribution (QKD) is guaranteed by the laws of physics. However, this claim is content-free if the underlying definition of theoretical QKD is not actually compatible with the laws of physics. This paper

    Multilevel Security for Cloud Computing using Cryptography
    free download
    ABSTRACT: Cloud Computing is a set of Information Technology Services, like network, software system, storage, hardware, software, and resources and these services are provided to a customer over a internet. These services of Cloud Computing are delivered

    Cryptography: Comparative Studies of Different Symmetric Algorithms
    free download
    Abstract:Security is the prerequisite and the most challenging part in any technology domain or internet or any network application. The ratio of transmitting data over the internet is escalating day by day so there is a need to protect the transmitted data. For that

    Latency Reduction with Cryptography based security in MANETs
    free download
    Abstract-Industrial application of wireless sensor networks require timelines in exchanging messages among nodes. To achieve low latency, high performance wireless links are used which resolves the mechanical problem of wired links. AODV was designed specifically for

    free download
    ABSTRACT: The widespread utilization of Location Based Services has been rising. It leads to two difficulties, one, protection of user personal location and two, protection of data in location server. Above two objectives were accomplished by two-stage approach. The first

    A Modified Signcryption Scheme using Elliptic Curve Cryptography
    free download
    Abstract:In this paper, an efficient signcryption scheme based on elliptic curve cryptosystem is going to be proposed which can effectively combine the functionalities of digital signature and encryption and also takes a comparable amount of computational

    free download
    The simplified scheme Encrypt a data x as Enc (x) and store it on the cloud. Encrypt a function f as Enc (f) and send it to the cloud. Ask the cloud to perform Enc (f)[Enc (x)]= Enc (f

    free download
    Abstract:To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Recently, regenerating codes have gained popularity due to their lower

    Access in Decentralized Online Social Network by Applying a Policy HidingCryptography and Parallel Processing
    free download
    Abstract Today, Online social networks (OSNs) suffers from various privacy and security concerns. Many users share their private and personal data on online social network. That is Users are not in the control of their own data and depends on Online Social Network (OSN

    free download
    Tiruvallur. ABSTRACT The Montgomery algorithm is considered to be the fastest algorithm for modular multiplication to compute XY mod n in cryptographic applications. A scalable architecture is described for the montgomery multiplication module for the finite fields GF (

    free download
    ABSTRACT Today the use of computers in every one life is a common and easy way to improve day to day life and to lead the community at large to nurture the benefits of modern technologies, but this common path needs security, in its operations. In the early part of

    Review of Asymmetric Key Cryptography in Wireless Sensor Networks
    free download
    Abstract In wireless sensor networks (WSN's), our main aim is to ensure the confidentiality of the data which has been sensed, aggregated and communicated to the base node. This will be achieved using key management. Symmetric key management uses only one key for

    White-Box Cryptography in the Gray Box
    free download
    Abstract. Implementations of white-box cryptography aim to protect a secret key in a white- box environment in which an adversary has full control over the execution process and the entire environment. Its fundamental principle is the map of the cryptographic architecture,

    A Symmetric Cryptography Based on Extended Genetic Algorithm
    free download
    Abstract:Genetic Algorithms are a class of optimization algorithms. GAs attempt to solve problems through modelling a simplified version of genetic processes. There are many problems for which a GA approach is useful. It is, however, undetermined if cryptanalysis

    Information Security: An Introduction to Cryptography
    free download
    Abstract Throughout time, all forms of communication have been subject to some sort of eavesdropping, be it interception of a telegram, the over-hearing of a conversation, or the active attacks on digital communications and networks. The constant search to improve

    free download
    ABSTRACT-To increase the security of messages sent over the internet steganography is used. This paper discussed a technique used on the LSB (least significant bit) and a new encryption algorithm. By matching data to an image, there is less chance of an attacker

    free download
    ABSTRACT Visual Cryptography is a special encryption technique to hide information in images, which divide secret image into multiple layers. Each layer holds some information. The receiver aligns the layers and the secret information is revealed by human vision

    Visual Cryptography Scheme for Secret Image Retrieval
    free download
    ABSTRACT: In multimedia system, first the message will encrypt and then it will hide into an image file. So that we can use Cryptography because this can converts the message into an unreadable text. These both provide the security over the unsecured communication

    Two Server Authentication using Shared Key Cryptography
    free download
    Abstract: For many years peoples were used to send the message using the post office and other media which is not that secure. Passwords are commonly used by people during log in process to access such as computer, ATM, network, etc. Earlier password based

    Embedded Visual Cryptography for Secret Color Images Sharing using Stamping Algorithm, Encryption and Decryption technique
    free download
    Abstract: Now-a-days, peoples are using emails for sharing their data. Sharing of secret information via emails is not that much secure as the information or data can be hacked easily by the third-party. In this current work we have proposed Visual Cryptographic

    free download
    Abstract-A new steganographic method using reversible texture synthesis is proposed in this paper. A texture synthesis process resamples a smaller texture image which synthesizes a new texture image with a similar local appearance and arbitrary size. Along with

    Advance Phishing Detection Using Visual Cryptography And One Time Password
    free download
    ABSTRACT: Advance Phishing Detection Using visual cryptography and OTP system aims at providing the facility to detect whether the site is phishing or not and will solve the problem of identity theft and phishing attack. Phishing is an act in which a user's credentials is

    Prevention of Phishing Threats using Visual Cryptography and One Time Password (OTP)
    free download
    Abstract: Internet is today's common need and it's being used for many purposes such as Email, business, shopping, e-commerce, social networking, financial transaction etc. With the increasing dependence on internet, the possibility of cheating/threats has been

    An Efficient Approach for Visual Cryptography Using Hybrid Mosiac image based SS
    free download
    Abstract:Here in this paper a new and efficient approach for the Visual Cryptography is implemented and is compared with other existing Visual Cryptographic techniques such as AES, DES and RSA. The proposed methodology implemented here is based on the

    A Two Phase Protection Scheme for Digital Images using VisualCryptography and Sampling Methods
    free download
    Abstract:A novel protection scheme for digital images based on visual cryptography and statistics is proposed. The proposed method employs sampling distribution of means and visual cryptography to achieve the requirements of robustness

    Review on Imbricate Cryptography
    free download
    Abstract: Electronic communications as internal communications tools are use by many organizations to enhance team work and to provide security. To provide a transaction in E- Business, it is important that the electronic communication has high degree of security and

    Three Levels of Protection by using Cryptography and Steganography
    free download
    Abstract The proposed research provide a new idea to protect the data as the data protection currently is necessary in all fields that use the world wide web as knownforLife is in need to use networks, internet and especially password to enter the private sites social

    targeted Cryptography
    free download
    Abstract: As flying, camera-bearing drones get smaller and lighter, they increasingly choke on the common ciphers as they interpret their commands, and send back their footage. New paradigm cryptography allows for minimum power, adjustable randomness security to

    Visual Cryptography Scheme for Colored Image using XOR with Random Key Generation
    free download
    Abstract:Visual Cryptography (VC), a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the Human Visual System (HVS), without the help of computers. Visual Cryptography Scheme

    Enhancing the Privacy of Users in eID schemes through Cryptography
    free download
    Long before the Internet came into existence, Governments have had public authentication schemes by issuing Identity documents to identify a person or verify aspects of a person's personal identity. These documents were trusted not only by the governments but also by

    Performance Analysis of VIJANA Cryptography With Stream Ciphers
    free download
    Abstract: Internet allows rapid sharing of the data across the globe. The important security issue is data security when it deals with the sensitive data. Hence strong security mechanism is needed to protect sensitive information. Cryptography is proved to be a

    Three Quadrant Method for Securing Image by Using Visual Cryptography
    free download
    ABSTRACT: Nowadays it becomes very necessary to protect digital media by some effective one of the method to secure digital media is visual cryptography. Naor and Shamir proposed first algorithm in the field of Visual Cryptography in 1994. So many methods have PQCrypto 2016, the 7th International Workshop on Post-Quantum Cryptography, was held in Fukuoka, Japan, during February 24�26, 2016. It was organized in cooperation with the International Association for Cryptologic Research. The aim of PQCrypto is to serve as a

    Cryptography without Computers
    free download
    Consider a deck with only black () and red () suits, where all cards of the same suit are identical. The back side (face-down) of each card is also identically shaped and denoted by. We use the following encoding for a bit by a sequence of two cards: 0 and 1

    Thrifty Zero-Knowledge-When Linear Programming Meets Cryptography
    free download
    Abstract. We introduce thrifty zero-knowledge protocols, or TZK. These protocols are constructed by introducing a bias in the challenge send by the prover. This bias is chosen so as to maximize the security versus effort trade-off. We illustrate the benefits of this

    free download
    Abstract-Internet is one of the most popular but insecure communication mediums. Since it is an open and insecure medium, malicious users can intercept data when people transmit personal information. In order to achieve data security, users need secure communication

    An Enhanced Audio In Audio Hiding Model By Combining Watermarking Steganography And Cryptography
    free download
    Abstract Today's increasing demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. Large number of The International Workshop on Lightweight Cryptography for Security and Privacy (LightSec) was established to promote novel research on the security and privacy issues for applications that can be termed as lightweight security due to the associated constraints

    Commutativity, Associativity, and Public Key Cryptography
    free download
    Abstract. In this paper, we will study some possible generalizations of the famous Diffie- Hellman algorithm. As we will see, at the end, most of these generalizations will not be secure or will be equivalent to some classical schemes. However, these results are not

    free download
    Abstract:Anonymity and traceability is more important for ecash payment system and wireless mesh network. An anonymity network enables users to access the Web while their identity on the Internet is blocked. Anonymity networks prevent traffic analysis and network

    Residue Number System as a Side Channel and Fault Injection Attack countermeasure in Elliptic Curve Cryptography
    free download
    Abstract:Implementation attacks and more specifically Power Analysis (PA)(the dominant type of side channel attack) and fault injection (FA) attacks constitute a pragmatic hazard for scalar multiplication, the main operation behind Elliptic Curve Cryptography. There exists

    A Review Paper on Development of Visual Cryptography Technique for Authentication Using Facial Images
    free download
    Abstract: Cryptography refers to the study of science and art for achieving security by encode the messages to make them the data is not readable. For example the readable message is converted into an unreadable message by using cryptographic system and this process

    Improving Iris Recognition Performance by Using Cryptography
    free download
    Abstract: Various aspects of existence area unit step by step being digitized as our life experiences and inventive effort area unit accumulate in personal computers digital media devices and mobile devices. Folks use password and different authentication strategies to

    Quantum Cryptography: A brief review of the recent developments and future perspectives
    free download
    ABSTRACT Quantum Cryptography is a novel approach to make the information and network world more secure. Unlike classical cryptography, quantum cryptography ensures the security of communication because it is based on the laws of Quantum Mechanics; a

    New Secure Authentication and Key agreement Scheme for Session Initiation Protocol using Elliptic Curve Cryptography
    free download
    Abstract:VoIP is new emerging technology for delivery of voice communication and multimedia session over the Internet. In VoIP network voice and signalling are multiplexed and travel as normal data inside the IP network. This growing popularity is due to cost

    Steganography using Genetic Algorithm along with Visual Cryptography for Wireless Network Application
    free download
    Abstract: For secure data hiding and transmission over the wireless network Image steganography is a best technique. The best way used to propose system is achieved by Least Significant Bit (LSB) based steganography using Genetic Algorithm (GA) along with

    On Negation Complexity of Injections, Surjections and Collision-Resistance inCryptography
    free download
    Abstract Goldreich and Izsak (Theory of Computing, 2012) initiated the research on understanding the role of negations in circuits implementing cryptographic primitives, notably, considering one-way functions and pseudo-random generators. More recently,

    E-Voting System using Visual Cryptography Homomorphic Encryption
    free download
    Abstract: Election is a process of establishing a democracy in the country. This process should be ensured to maintain the integrity and confidentiality of the vote casted and the authentication before citizens of particular country casts their votes [1]. It is very important

    Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability
    free download
    Abstract. Signal security aims to prevent the adversary from copying communication signals so it is with quantum cryptography. Information security focuses on preventing the adversary from knowing plaintext or cheating users so it is with classical cryptography.

    Elliptic Curves Cryptography and Lenstra's Method
    free download
    Abstract The aim of this talk is to present some important applications of elliptic curves in the world of cryptography. First of all I will recall the main results about elliptic curves which will be useful for the applications, such as Weierstrass form, Group Law and Hasse Theorem,

    Secure Payment System using Steganography and Visual Cryptography
    free download
    Abstract-In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a

    Secured Wireless Communication Through Zigbee using Cryptography and Steganography
    free download
    Abstract Network security and protection of data have been of great concern and a subject of research over the years. There are many different forms of steganography mechanisms like LSB, Masking and filtering and Transform techniques. All of them have respective strong

    Threshold Visual Cryptography For Fingerprint Based Authentication
    free download
    ABSTRACT The main idea of this paper is efficiently apply the Threshold Visual Cryptography Technique onto the area of authentication using fingerprints. To overcome the server side attack, in the proposed system the fingerprint template is divided into two or

    Scalable Message Authentication System Based on Elliptic CurveCryptography in Wireless Sensor Networks
    free download
    Abstract: Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either

    A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography
    free download
    ABSTRACT Security of information and optimal bandwidth utility has become major problem with growth in data communication over computer networks. Steganography and cryptography are two different data hiding techniques employed to solve this problem.

    A Contribution to Enhance the Panoramic Image Security via Cryptographyand Shuffled Methods
    free download
    Abstract:-Major changes have been accounted in the field's of information technology (IT), the information that may in the form of audio, video and text, can be transferred anytime, from source to destination or vice versa that may located in anywhere in the World. The

    free download
    The widespread of internet and electronic communication has led us to focus our attention on how this data can be transmitted securely over the network without been tampered with. This issue of security can be handled using cryptographic systems. This paper intends to

    free download
    ABSTRACT Visual Cryptography is a new technique for securing the visual information like picture, text etc. The basic idea of Visual Cryptography is that images are divided into several parts called shares. These shares are distributed among concerned participants

    free download
    An elliptic curve is one of the form: y2= x3+ ax+ b where the coefficients a and b are chosen from some field K. All of our work in this paper will be done with K= GF (p)= Zp,+,�. We require that the cubic x3+ ax+ b does not have repeated roots in Zp which is equivalent to

    The key to blame: Gradual typing meets cryptography
    free download
    Abstract This paper connects several ways to achieve relational parametricity. Universal types are used in statically typed languages; runtime type generation is used in gradually typed languages; and cryptographic sealing is used in untyped languages. To this end,

    A Survey Paper on Data Security in Cloud Computing using ThresholdCryptography and User Revocation
    free download
    Abstract-Cloud computing is extremely well known in associations and foundations on the grounds that it gives stockpiling and computing administrations at low cost. Nonetheless, it additionally presents new difficulties for guaranteeing the confidentiality, integrity and

    A Real Time Approach for Secure Text Transmission by using VideoCryptography
    free download
    Abstract--Text, Image and video are the most basic forms of transmitting information. With the help of text and Image encryption methods, any particular set of words or images can be transmitted without worrying about security. With the help of pixel mapping algorithm, we

    Cryptography and Steganography Algorithm for Hiding Text in HTML Document
    free download
    Abstract:As we know, our internet is growing fast and rapidly. It is very essential to secure the information. In this paper, we use text steganography technique which uses HTML document as the cover medium to hide secret messages. We are using C#. net technology

    An Efficient Interception Mechanism Against Cheating In Visual CryptographyWith Non Pixel Expansion Of Images
    free download
    Abstract: Visual cryptography is a technique of cryptography in which secret images are divided into multiple shares and are distributed to different entities. Each secret can be reconstructed by superimposing these shares using different operations. Common The 19th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2016) was held March 6�9, 2016 in Taipei (Taiwan). The conference, sponsored by the International Association for Cryptologic Research (IACR), focuses on all technical

    free download
    ABSTRACT Visual cryptography scheme is a cryptographic technique which allows visual information. It is solve the poor visual quality problem. XOR-based VC. Actually, two XOR- based VC algorithms are proposed, namely XOR-based VC for general access structure (

    Analysis of Different Cryptography Algorithms
    free download
    Abstract Cryptography is a very important tool for protecting information in Internet. Every time we connect to the Internet the browser uses appropriate cryptographic algorithms on our behalf. There are various cryptography techniques under the symmetric and

    A Subgradient Algorithm For Computational Distances and Applications toCryptography
    free download
    Abstract The task of finding a constructive approximation in the computational distance, while simultaneously preserving additional constrains (referred to as" simulators"), appears as the key difficulty in problems related to complexity theory, cryptography and

    Enhancing Cloud Data Security Using Elliptical Curve Cryptography
    free download
    Abstract: Cloud computing is one of the hottest technology of the IT trade for business. Cloud computing security has changed into a popular topic in sector and academic research. Cloud Computing is a conceptual service based technology which is used by many

    Secure E-Payment System using Visual Cryptography
    free download
    In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of

    Share-Deterring Public Key Cryptography
    free download
    Abstract. How is it possible to prevent the sharing of cryptographic functions This question appears to be fundamentally hard to address since in this setting the owner of the key is the adversary: she wishes to share a program or device that (potentially only partly)

    Arithmetic Coding and Blinding for Lattice Cryptography
    free download
    Abstract. In this work we apply information theoretically optimal arithmetic coding and a number of novel side-channel blinding countermeasure techniques to create BLZZRD, a practical, compact, and more quantum-resistant variant of the BLISS Ring-LWE Signature

    Secure Communication Using Elliptic Curve Cryptography on Android Devices
    free download
    Abstract-SMS (Short Message Service) is being used in many daily life applications. When we send a message from one device to another, the message transmit as plain text. Sometimes this message may be confidential, and it is a major disadvantage to send such

    Implementing Curve25519 for Side-Channel-Protected Elliptic CurveCryptography
    free download
    For security-critical embedded applications Elliptic Curve Cryptography (ECC) has become the predominant cryptographic system for efficient key agreement and digital signatures. However, ECC still involves complex modular arithmetic that is a particular burden for

    Cryptography Techniques based on Security of AODV in MANETs-A Survey
    free download
    Abstract: Network's popularity and demand has motivated the development of mobile adhoc networks (MANETs). MANETs are a kind of wireless adhoc network which is infrastructure less. Each device or nodes are free to move independently in any random direction due to

    Speeding up the Number Theoretic Transform for Faster Ideal Lattice-BasedCryptography
    free download
    Abstract. The Number Theoretic Transform (NTT) provides efficient algorithms for cyclic and nega-cyclic convolutions, which have many applications in computer arithmetic, eg, for multiplying large integers and large degree polynomials. It is commonly used in

    Lossless And Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption With Public Key Cryptography
    free download
    ABSTRACT Image processing is processing of images in order to improve its quality. Now a day, more focus is on reversible data hiding (RDH) in encrypted images, so it maintains the excellent property that the original cover image can be easily recovered without any loss

    Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
    free download
    Abstract. The Coppersmith methods is a family of lattice-based techniques to find small integer roots of polynomial equations. They have found numerous applications in cryptanalysis and, in recent developments, we have seen applications where the number

    Elliptic Curve Cryptography: Theory for EdDSA
    free download
    This article sums up research results from the field of Elliptic Curve Cryptography I needed for my implementation of EdDSA. An ECDH implementation was given, but I extended it for Curve25519. If you start working in that field, check out the Explicit Formula Database (

    An Attribute based Cryptography Mechanism for Minimum Disclosure of Sensitive Patient Health Information at Emergency in m-Healthcare
    free download
    Abstract-Today Mobile Healthcare system is being part of regular healthcare system. In mobile healthcare system Body Sensor Node (BSN) collects heath data such as blood pressure, blood sugar level and others of patients and further transmitted to smartphone.

    Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme
    free download
    Abstract The current Digital Rights Management (DRM) systems use attribute-based encryption (ABE) and proxy re-encryption (PRE) to achieve fine-grained access control in cloud computing. However, these schemes have some limitations particularly in terms of


    0 thoughts on “Advanced Cryptography Research Papers

    Leave a Reply

    Your email address will not be published. Required fields are marked *