Applied Cryptography
8,105 Followers
Recent papers in Applied Cryptography
I the undersigned do hereby endorse that the information contained herein is my original work under the management of my supervisor. Where necessary, citations have been added to acknowledge other researchers whose work I have referred... more
In this paper we discuss an efficient implementation for selective disclosure of attribute-based credentials on smart cards. In this context we concentrate on the implementation of this core feature of IBM's Identity Mixer (Idemix)... more
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
There is deepest intuitive analogy between what geneticists and what cryptographers are doing with hash functions. I attempt to continue further exploration of such remarkable world of genetics-as-a-cryptography. And today I would like to... more
Cellular Automata is one of the most fascinating disciplines. It is being used in many practical applications but it's used in cryptography is still not being explored. A technique of generating key for public key cryptography has been... more
Cryptography is playing an increasingly important role in the computing and telecommunications industry. The cryptographic schemes currently employed, however, are theoretically breakable given enough time and/or computing resources.... more
Instant messaging services are quickly becoming the most dominant form of communication among consumers around the world. Apple iMessage, for example, handles over 2 billion messages each day, while WhatsApp claims 16 billion messages... more
In this era of information technology and e-commerce security is the key aspect while transmitting confidential information over insecure network like internet. In order to protect the information, various security mechanisms are used.... more
Cryptography is a field that has developed very rapidly with the number of algorithms that keep popping up with this type of symmetric and asymmetric which has advantages and disadvantages of each, one of the problems that arise in... more
Abstract — Genetic algorithm based Cryptanalysis has gained considerable attention due to its fast convergence time. This paper proposes a Genetic Algorithm (GA) based cryptanalysis scheme for breaking the key employed in Simplified- AES.... more
There are many challenges for a forensic investigator when it comes to digital evidence. These include the constantly changing technology that may store evidence, the vast amounts of data that is stored, and the increasing use of... more
Cryptocurrency for Beginners Bear in mind that dissatisfaction with the current financial system gave rise to the development of the digital currency. High quality content, great conversions and happy customers click here now.... more
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,... more
The future developments of the wireless sensor networks and its applications demands for the efficient and secure communication. For the solution of efficient and reliable security needs cryptography algorithms provides good solutions.... more
Basic options of PDF encryption presented.
The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of algorithm which comprise of encryption and decryption. The... more
International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
Money is one of mankind's earliest and greatest inventions. Money, as we know it today has a long evolutionary history. The process started from barter in ancient times and evolved into cryptography-based money in modern times. The... more
CARA MENGHITUNG HILL CIPHER DENGAN MATRIKS KUNCI ORDO 3x3 dan ORDO 2x2 DENGAN EXCEL
The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of algorithm which comprise of encryption and decryption. The... more
International Journal on Foundations of Computer Science & Technology (IJFCST) is a Bi-monthly peer-reviewed and refereed open access journal that publishes articles which contribute new results in all areas of the Foundations of Computer... more
Now, in the 21st century, we can decipher the clues left for us in paintings, suspicious death reports, poetry, plays, and 20th century analyses of 16th century documents. They are like a time capsule intended to be discovered at a... more
With the increased value of organizational data and evolution of Information Technology, that allows data availability and sharing, it grows the risk of inappropriate use of confidential corporative information. An approach often adopted... more
The cryptography is the art of protecting information by transforming encryption into unreadable format called cipher text. Only those who possess a secret key can decipher the message into plaintext. Either single or more... more
Security threats have been a major concern as a result of emergence of technology in every aspect including internet market, computational and communication technologies. To solve this issue effective mechanism of " cryptography " is used... more
11th International Conference on Information Theory (IT 2022 ) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Information Theory. The goal of this conference is... more
Cryptography is a field that has developed very rapidly with the number of algorithms that keep popping up with this type of symmetric and asymmetric which has advantages and disadvantages of each, the algorithm Arnold's Cat Map is one... more
The Edge of Creative Destruction is a compilation of investigative economic writings on to what extent does bitcoin embodies the principles of the denationalization of money set forth by renowned Austrian economist, philosopher and Noble... more
The cryptographic literature is replete with algorithms for encryption and decryption which use a deck of cards as its source of randomness to generate a keystream. Two of the most well-known field ciphers of this type are Pontifex,... more
Epithets of Zeus and Dionysus, similar to the Orphic hymns
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
Genomic data holds salient information about the characteristics of a living organism. Throughout the last decade, pinnacle developments have given us more accurate and inexpensive methods to retrieve genome sequences of human beings.... more
The trade business license certificate (SIUP) is a paper-based license to conduct trade businesses in Indonesia issued by the government. Until today, there is no mechanism for verifying the validity of document unless to verify it... more
—In today's GSM networks, the security provided by the network operators is limited to the wireless links only. The information traveling over the wired links is insecure and weak encryption algorithms are used, therefore end-to-end... more
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is... more