Search

Showing total 221 results
221 results

Search Results

1. Scrambling additive lagged-Fibonacci generators.

2. Preface to the First Annual MathCrypt Proceedings Volume.

3. Methods of linear and differential relations in cryptography.

4. Cryptanalysis of various images based on neural networks with leakage and time varying delays.

5. Revisiting structure graphs: Applications to CBC-MAC and EMAC.

6. Design and Development of a Multiobjective Cost Function for Robust Video Watermarking Using Wavelet Transform.

7. Comments on efficient batch verification test for digital signatures based on elliptic curves.

8. On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in ℚ(𝜁2𝑠).

9. A Stream/Block Combination Image Encryption Algorithm Using Logistic Matrix to Scramble.

10. Frontmatter.

11. An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm.

12. The Eleventh Power Residue Symbol.

13. Algebraic approaches for solving isogeny problems of prime power degrees.

14. On a mnemonic construction of permutations.

15. Building a Distributed Trust Anchor in P2P Systems -- Creating Trustworthy System Signatures without a Trusted Third Party.

16. The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem.

17. Designing Efficient Dyadic Operations for Cryptographic Applications.

18. Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data.

19. Performance Evaluation of Modified Color Image Steganography Using Discrete Wavelet Transform.

20. Randomized nonlinear software-oriented MDS diffusion layers.

21. Unconditionally secure signature schemes revisited.

22. On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in ℚ(𝜁2𝑠).

23. Some applications of arithmetic groups in cryptography.

24. Cryptanalysis of a hash function, and the modular subset sum problem.

25. Modern random number generator design – Case study on a secured PLL-based TRNG.

26. Theory of 3-rotation symmetric cubic Boolean functions.

27. DAGS: Key encapsulation using dyadic GS codes.

28. On the optimality of non-linear computations for symmetric key primitives.

29. Persistent asymmetric password-based key exchange.

30. PSP: Parallel sub-pipelined architecture for high throughput AES on FPGA and ASIC.

31. Foreword. Second Workshop on Mathematical Cryptology.

32. New methods of construction of cartesian authentication codes from geometries over finite commutative rings.

33. Analysis of a key exchange protocol based on tropical matrix algebra.

34. A Multiple Criteria-Based Cost Function Using Wavelet and Edge Transformation for Medical Image Steganography.

35. A Novel Scene-Based Video Watermarking Scheme for Copyright Protection.

36. A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage.

37. Another look at HMAC.

38. New security notions and relations for public-key encryption.

39. The power of primes: security of authentication based on a universal hash-function family.

40. Cryptanalysing the critical group: efficiently solving Biggs's discrete logarithm problem.

41. Numerical solvers and cryptanalysis.

42. Improved security analysis for OMAC as a pseudorandom function.

43. Rigorous upper bounds on data complexities of block cipher cryptanalysis.

44. Applications of design theory for the constructions of MDS matrices for lightweight cryptography.

45. On 1-stable perfectly balanced Boolean functions.

46. Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm.

47. Improved Markov Chain Monte Carlo method for cryptanalysis substitution-transposition cipher.

48. Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya's theorem approach.

49. Functions without short implicents. Part I: lower estimates of weights.

50. Detection of embeddings in binary Markov chains.