• No results found

cryptography schemes

State-of-the-Art Visual Cryptography Schemes

State-of-the-Art Visual Cryptography Schemes

... Visual cryptography schemes were applied to only black and white images until the year ...visual cryptography scheme was developed by Verheul and Van Tilborg [ 27 ] ...coloredvisual ...

9

A review paper on various visual cryptography schemes

A review paper on various visual cryptography schemes

... sharing schemes have been developed which gave rise to new technologies in the area of Image Cryptography which would require less computation and less ...Visual cryptography (VC) which allows the ...

5

Cryptography Schemes on Distributed, Concurrent and Independent Access of Cloud Data
K Bharati Reddy, P Vaishali & V Aruna

Cryptography Schemes on Distributed, Concurrent and Independent Access of Cloud Data K Bharati Reddy, P Vaishali & V Aruna

... Support to the execution of SQL statements issued by multiple freelance (and presumptively geographically distributed) customers is one in each of the foremost nec- essary edges of SecureDBaaS with relevancy progres- ...

5

A Comprehensive Study on Various Visual cryptography Schemes with an Application

A Comprehensive Study on Various Visual cryptography Schemes with an Application

... 651 One of the ways to hide a secret data within natural image is by typically employing visual cryptography based on halftone techniques. The perfect scheme is extremely practical and can reveal secrets without ...

5

Analysis of Visual Cryptography, Steganography Schemes and its Hybrid Approach for Security of Images

Analysis of Visual Cryptography, Steganography Schemes and its Hybrid Approach for Security of Images

... A Visual cryptography is a cryptographic scheme used to encrypt image based data such as handwritten notes, signature, pictures, diagrams etc. and decryption can achieve directly by human visual system, without ...

6

New Approach of Visual Cryptography Scheme for Hiding Color Images

New Approach of Visual Cryptography Scheme for Hiding Color Images

... new schemes is that they use meaningless shares to hide the secret and the quality of the recovered plaintext is ...advanced schemes based on visual cryptography were introduced in [1, 3, 5] where a ...

5

Review of various visual cryptography methods to improve security in image transaction
                 

Review of various visual cryptography methods to improve security in image transaction  

... visual cryptography scheme in ...visual cryptography in which the secret image is divided into two ...visual cryptography in ...Visual cryptography schemes were applied to only black ...

5

Decoding  Random  Binary  Linear  Codes  in $2^{n/20}$:  How $1+1=0$  Improves  Information  Set  Decoding

Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding

... variant, a very useful tool for many cryptographic constructions, is equivalent to the LPN search problem, and thus equivalent to decoding a random linear code. The LWE problem of Regev [26] is a generalization of LPN to ...

21

Compact,  Scalable,   and  Efficient  Discrete  Gaussian  Samplers  for  Lattice-Based  Cryptography

Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography

... quantum-safe) cryptography has seen a substantial expansion, due to recent advances in scalable quantum ...quantum-safe cryptography is reflected by the stance of government agencies, including CNSS and ...

5

Constant  Size  Traceable  Ring  Signature  Scheme  without  Random  Oracles

Constant Size Traceable Ring Signature Scheme without Random Oracles

... Currently several traceable (or linkable) identity-based ring signature schemes have been proposed. However, most of them are constructed in the random oracle model. In this paper, we present a fully traceable ...

31

Design A Hybrid Algorithm For Improving Cyber Security Using Steganography

Design A Hybrid Algorithm For Improving Cyber Security Using Steganography

... for cryptography that involves altering the signal to cloud its meaning to vindictive people that prevent ...In cryptography, when the assailant can peruse the signal of mystery, the structure is ...using ...

5

Implementation of Different Schemes of Visual Cryptography 1Snehal N.Ghule, 2Rupali R.Bathe, 3Jyoti D.Thomabre, 4Swapnali S.Misal

Implementation of Different Schemes of Visual Cryptography 1Snehal N.Ghule, 2Rupali R.Bathe, 3Jyoti D.Thomabre, 4Swapnali S.Misal

... This kind of scheme allows dividing a secret image (secret data) into k number of shares. Then the secret image can be revealed from any n number of shares among k. For example, In 3 out of 6 VC scheme, any 3 shares out ...

5

The Fate of Cryptography in a Post-Quantum World

The Fate of Cryptography in a Post-Quantum World

... Abstract: When the rate of technological advancement is considered, it is clear that a Post-Quantum World is inevitable. Trying to prevent or delay the advancement of Quantum Technology is not the answer as it could be ...

6

Kryptos+Graphein= Cryptography

Kryptos+Graphein= Cryptography

... Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption) conversion of messages from a comprehensible form into an incomprehensible one and back again at the other ...

5

Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel  Secure Multiparty Computation

Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation

... In this paper, we propose a novel approach to securing multiparty computation using elliptic curve cryptography. We empirically evaluated various ECC based homomor- phic encryption schemes for our proposed ...

7

Volume 2, Issue 3, March 2013 Page 72

Volume 2, Issue 3, March 2013 Page 72

... key cryptography, a single key is used for both encryption and ...key cryptography is also called symmetric ...of cryptography, it is obvious that the key must be known to both the sender and the ...

9

IMPROVED PROXY RE-ENCRYPTION SCHEMES WITH ATOMIC PROXY CRYPTOGRAPHY

IMPROVED PROXY RE-ENCRYPTION SCHEMES WITH ATOMIC PROXY CRYPTOGRAPHY

... proxy cryptography,” in which a semitrusted proxy computes a function that converts ciphertexts for Alice into ciphertexts for Bob without seeing the underlying ...

8

A Review on Visual Secret Sharing Schemes

A Review on Visual Secret Sharing Schemes

... sharing schemes such as visual cryptography based schemes, random grid based schemes, polynomial based schemes and Boolean operation based schemes are ...

5

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

... visual cryptography scheme. In c-colorful visual cryptography scheme one pixel is transformed into m sub pixels, and each sub pixel is divided into c color ...visual cryptography scheme with c ...

13

A Study and Analysis of Ant phishing Schemes in Cryptography

A Study and Analysis of Ant phishing Schemes in Cryptography

... In [4] containing the steps of visual cryptography during which two phases are carried out. First is registration part and second is login part. In registration part the secret key is asked from the user for the ...

5

Show all 5172 documents...

Related subjects