loading
Rogers' Isomorphism Theorem and Cryptology Applications
2015 Edition, Volume 13, June 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

This paper presents a Theory of Computation study based on recursive functions computability and innovates by performing parallels to relevant themes of Cryptography. Hence, it is presented the Hennie's notion of "abstract family of algorithms" (AFA, for short) according to the authors'...

Generalized Subspace Subcodes with application in Cryptology
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Most codes with an algebraic decoding algorithm are derived from Reed-Solomon codes. They are obtained by taking equivalent codes, for example Generalized Reed-Solomon codes, or by using the so-called subfield subcode method, which leads to Alternant codes over the underlying prime field, or over...

Generalized Subspace Subcodes With Application in Cryptology
2019 Edition, Volume 65, August 1, 2019 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Most codes with an algebraic decoding algorithm are derived from Reed-Solomon codes. They are obtained by taking equivalent codes, for example, generalized Reed-Solomon codes, or by using the so-called subfield subcode method, which leads to alternant codes over the underlying prime field, or over...

Multiple-radix arithmetic on parallel machines and applications to cryptology
1991 Edition, January 1, 1991 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The multiple-radix representation of integers is a candidate for improving computations involving large integers using parallel processors. Results are found for efficiently comparing two numbers in multiple-radix form, and also for reducing one number modulo a fixed number in multiple-radix...

Teaching Cryptology Course Based on Theory-Algorithm-Practice-Application Mode
2009 Edition, Volume 2, March 1, 2009 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The cryptology course is an important curriculum of the major in information security and the interrelated majors. The teaching mode based on theory- algorithm-practice-application in cryptology course is proposed by combining the characteristic of cryptology...

Efficient Cryptology-Specific Instructions Generation with Algebra Primitives
2015 Edition, November 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

This paper presents a novel approach for cryptology-specific instructions generation on a reconfigurable architecture which is named ASRA. The ASRA tightly integrates a customized reconfigurable core with a very-long instruction word basic core. Both cores in ASRA can work in parallel. The...

Side-channel Analysis of Chaos-based Substitution Box Structures
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

There is a theoretically strong relationship between chaos and cryptology. In practice, one of the most successful applications of this relationship is chaos-based s-box structures. However, the performance metrics of chaos-based s-box designs are worse compared to those for...

Key note lecture multidisciplinary in cryptology and information security
2013 Edition, December 1, 2013 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Summary form only given. To reach the high depths of knowledge and expertise which are required nowadays, scientists focus their attention on minute areas of study. However, the most complex problems faced by scientists still need the application of different disciplines to tackle...

Privacy-preserving linear regression for brain-computer interface applications
2018 Edition, December 1, 2018 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Many machine learning (ML) applications rely on large amounts of personal data for training and inference. Among the most intimate exploited data sources is electroencephalogram (EEG) data. The emergence of consumer-grade, low-cost brain-computer interfaces (BCIs) and...

The protection for private keys in distributed computing system enabled by trusted computing platform
2010 Edition, Volume 5, June 1, 2010 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Trusted computing technology, as a quickly developing technology in recent years, is helpful to improve the computer security and build a trusted computing environment for not only PC system but also distributed computing system. The core of trusted computing technology is cryptology....

Advertisement