Result page:
1
2
3
4
5
6
7
8
9
10
>>
1
April 2015
ACM Transactions on Programming Languages and Systems (TOPLAS): Volume 37 Issue 2, April 2015
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 18, Downloads (12 Months): 181, Downloads (Overall): 476
Full text available:
PDF
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound with respect ...
Keywords:
Cryptography
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
Cryptography
References:
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, and François Dupressoir. 2013. Certified computer-aided cryptography: Efficient provably secure machine code from high-level implementations. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, 1217--1230.
Full Text:
... Manuel Barbosa, Gilles Barthe, and Franc ois Dupressoir. 2013. Certified computer-aided cryptography: : Efficient provably secure machine code from high-level implementations. In ...
2
October 2004
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum development
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 11, Downloads (12 Months): 144, Downloads (Overall): 1,085
Full text available:
PDF
Traditionally, courses in cryptography have been heavily mathematical in nature. Yet, there is a large population of Information Systems practitioners who are not mathematicians, but who need to implement cryptography as a part of an overall system that they are developing. These people need a thorough understanding of the characteristics ...
Keywords:
cryptography
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
cryptography
Abstract:
Traditionally, courses in cryptography have been heavily mathematical in nature. Yet, there is a ... practitioners who are not mathematicians, but who need to implement cryptography as a part of an overall system that they are ... significant flaws. This paper describes an attempt to structure a cryptography
Title:
A cryptography course for non-mathematicians
References:
Menezes, A., van Oorschot, P., Vanstone, S. Handbook of Cryptography, CRC Press, New York, 2001.
Schneier, B. Applied Cryptography, Protocols, Algorithms, and Source code in C, (2nd Edition), Wiley & Son, New York, 1996.
Stallings, W. Cryptography and Network Security: Principles and Practices, (3rd Edition), Prentice-Hall, Upper Saddle River, NJ, 2003.
Sun Microsystems, Java Cryptography Architecture, API Specification and Reference http://java.sun.com/j2se/1.4.1/docs/guide/security/CryptoSpec.html, 2002
Full Text:
Microsoft Word - 18_rschlesinger.doc 94A Cryptography Course for Non-Mathematicians Rich Schlesinger Kennesaw State University 1000 Chastain ... Kennesaw GA 30144 +1 770-423-6039 rschlesi@kennesaw.edu ABSTRACT Traditionally, courses in cryptography have been heavily mathematical in nature. Yet, there is a ... practitioners who are not mathematicians, but who need to implement cryptography as a part of an overall system that they are ... significant flaws. This paper describes an attempt to structure a cryptography course for IS practitioners. Categories and Subject Descriptors C.2.0 [Computer ... Authentication, Invasive software, Unauthorized access. General Terms Algorithms, Security. Keywords Cryptography 1. INTRODUCTION Historically, cryptography has been taught as a highly mathematical subject, utilizing Finite ... and Usage). Because of this emphasis on the mathematics of cryptography, , many students who would otherwise take a cryptography course and who would need knowledge of cryptography as Information Systems practitioners fail to learn this material. This ...
... one programming assignment and one paper. Assignment Type Points Quantum Cryptography Paper 1 Modes of Operation Programming 2 WEP Paper 2 ...
... of teaching students about the necessary communication protocols required in cryptography without getting mired in the underlying mathematics. The combination of ... [2] Menezes, A., van Oorschot, P., Vanstone, S. Handbook of Cryptography, , CRC Press, New York, 2001. [3] Bond, M. & ... (FIPS PUB 140-2), Washington, DC, 2001. [9] Schneier, B. Applied Cryptography, , Protocols, Algorithms, and Source code in C, (2nd Edition), ... M., Microsoft Passport to Trouble, http://alive.znep.com/~marcs/passport/, 2001 [11] Stallings, W. Cryptography and Network Security: Principles and Practices, (3rd Edition), Prentice-Hall, Upper ... Prentice-Hall, Upper Saddle River, NJ, 2003. [12] Sun Microsystems, Java Cryptography Architecture, API Specification and Reference http://java.sun.com/j2se/1.4.1/docs/guide/security/CryptoSpec.html, 2002 [13] Sun Microsystems, ...
3
March 2004
ACM SIGCSE Bulletin: Volume 36 Issue 1, March 2004
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 5, Downloads (12 Months): 68, Downloads (Overall): 1,497
Full text available:
PDF
The panel discusses solutions to the problem of computer security education.
Keywords:
security, cryptography
Also published in:
March 2004
SIGCSE '04: Proceedings of the 35th SIGCSE technical symposium on Computer science education
CCS:
Cryptography
Keywords:
cryptography
Title:
Cryptography and computer security for undergraduates
References:
Bishop, D. Introduction to Cryptography with Java Applets. Jones and Bartlett, Sudbury, MA, 2003.
Diffie, W. and Hellman, M. New Directions in Cryptography. IEEE Transactions on Information Theory 22,6 (Nov. 1976), 644--654.
Full Text:
Panel Proposal Cryptography and Computer Security for Undergraduates Paul De Palma (Moderator) Charles ... E.3 [Data Encryption]: public key cryptosystem General Terms: Security Keywords: cryptography, , security 1. SUMMARY Paul De Palma Diffie and Hellman ... ?We stand today on the brink of a revolution in cryptography. . ?[6]. A little over twenty years later, then Deputy ... downloading, why don?t we feel safe? The answer is that cryptography is mathematics, but security requires that cryptographic algorithms be embedded ... textbooks, many written by mathematicians [3,9,17]. The problem is that cryptography straddles mathematics and computer science. Computer science students often do ... assume with Schneier that computer security may well begin with cryptography but certainly does not end there. It?s easy to imagine ... there. It?s easy to imagine teaching a one-semester course on cryptography to suitably prepared students. But what about the rest? What ... discipline is inversely proportional to its maturity. On this view, cryptography is mature and tractable, while computer security is a great ... algorithms and protocols. They need to be able to apply cryptography to enhance the security of the software they will develop ... and of the systems that they will manage. I incorporate cryptography into the computer security courses that I teach to advanced ... University [7]. I use [12] as the textbook for the cryptography part of my courses. The ciphers I cover include DES, ... Since I want my students to be able to incorporate cryptography into their programs, we look at a variety of Java ... look at a variety of Java applications [8] that employ cryptography. . I assign my students several small Java programs including ... several small Java programs including a network application that uses cryptography. . We encrypt our email with PGP. We also cover ...
... not cover classical, yet obsolete, ciphers or the history of cryptography. . My course is not a mathematically rigorous presentation. It ... course is not a mathematically rigorous presentation. It is applied cryptography. . Suzanne E. Gladfelter Students need to appreciate historical cryptology ... cryptology and understand modern cryptological algorithms and protocols before applying cryptography to computer security issues. I team-teach an introductory upper-division, multi-disciplinary ... State York [10]. We discuss monoalphabetic ciphers through public key cryptography; ; we use [2] and [15] as the textbooks along ... computer security. Joshua Holden I have two goals in teaching cryptography to computer science students: to use cryptography as a ?cool way? of introducing important areas of mathematics ... the past two years I have co-taught a course in cryptography at the Rose-Hulman Institute of Technology with David Mutchler, a ... arithmetic, algebraic structures, iteration, recursion, diffusion and confusion, etc. Since cryptography is a fast-moving subject, we feel that it is more ... than to worry about the details of implementations. Discussions of cryptography and society revolve around readings from [13]. 3. REFERENCES [1] ... A. Cryptology. MAA. DC, 1994. [3] Bishop, D. Introduction to Cryptography with Java Applets. Jones and Bartlett, Sudbury, MA, 2003. [4] ... www.columbia.edu/~ariel/hr695/crowell-mar20.html. [6] Diffie, W. and Hellman, M. New Directions in Cryptography. . IEEE Transactions on Information Theory 22,6 (Nov. 1976), 644-654. ...
4
September 2011
InfoSecCD '11: Proceedings of the 2011 Information Security Curriculum Development Conference
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 6, Downloads (12 Months): 56, Downloads (Overall): 506
Full text available:
PDF
The cryptography of elliptical curve (ECC) is an approach in cryptography public key based on the algebraic structure of elliptical curves on the finished fields; a smaller group can be used to obtain the same level of security as RSA-based. In this article a simple presentation on cryptography with focus ...
Keywords:
cryptography algorithms, elliptic curve cryptography, RSA, cryptography
CCS:
Cryptography
Keywords:
cryptography algorithms
elliptic curve cryptography
cryptography
Abstract:
<p>The cryptography of elliptical curve (ECC) is an approach in cryptography public key based on the algebraic structure of elliptical curves ... security as RSA-based. In this article a simple presentation on cryptography with focus on elliptic curve algorithm, examine its security, benefits ...
References:
Entrust.com 2008. Elliptic Curve PKI: An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography.
Vittorio, S. 2002. Quantum Cryptography: Privacy Through Uncertainty. Retrieved from CSA information company: http://www.csa.com
Bennett, C. H., & Brassard, G. 1984. Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, (pp. 175--179). Bangalore, India: IEEE.
Bennett, C. H., Brassard, G., & Ekert, A. K. 1992. Quantum cryptography. Scientific American, pp. 50--57.
Goldreich, O. 2001. Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press.
Katz, J., & Lindell, Y. 2007. Introduction to Modern Cryptography. Chapman and Hall/CRC Press.
Menezes, A. J. 1996. Handbook of Applied Cryptography. CRC Press.
RSALab. 1992. Cryptography FAQ Chapter 2 and Chapter 2. Retrieved from Rsa Lab: http://www.rsa.com/rsalabs/node.asp?id=2213
Miller, V. 1985. Use of elliptic curves in cryptography. CRYPTO 85.
Rosing, M. 1999. Implementation Elliptic Curve Cryptography. Manning Pub.
Blake, I. F. 2005. Advances in Elliptic Curve Cryptography. Cambridge University Press Series: London Mathematical Society Lecture Note Series (No. 317).
nsa.gov. 2009. The Case for Elliptic Curve Cryptography. Retrieved from The National Security Agency Central Security Service: can be retrieved from http://www.nsa.gov/business/programs/elliptic_curve.shtml
nsa.gov. (n.d.). NSA Suite B Cryptography. Retrieved from The National Security Agency Central Security Service: can be retrieved from http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml
Soutar, C., Roberge, D., Stoianov, A., Gilro, R., & Kumar, B. V. 1999. Biometric Encryption. In R. K. (ed), ICSA Guide to Cryptography (p. chapter 22 in). McGraw-Hill.
Zhu, L., Jaganathan, K., & Lauter, K. (2008). RFC5349 - Elliptic Curve Cryptography (ECC) Support for Public. faqs.org.
Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., & Moeller, B. 2006. RFC4492 - Elliptic Curve Cryptography (ECC) Cipher Suites for T. faqs.org.
entrust.com. 2008. Elliptic Curve PKI: An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography. Retrieved from www.entrust.com: www.entrust.com
Wasim Al-Hamdani.2010. Cryptography Based Access Control in Healthcare Web Systems. InfoSec CD 2010, Proceedings of the 7th annual conference on Information security curriculum development http://infosec.kennesaw.edu/InfoSecCD/
Leu, M.-C., & Sun, H.-M. (2009). Authentication method employing elliptic curve cryptography. Retrieved from faqs.org: http://www.faqs.org/patents/
Full Text:
... University 400 East Main, KY 40601 USA wasim.al-hamdani@kys.edu ABSTRACT The cryptography of elliptical curve (ECC) is an approach in cryptography public key based on the algebraic structure of elliptical curves ... security as RSA-based. In this article a simple presentation on cryptography with focus on elliptic curve algorithm, examine its security, benefits ... Authentication, Cryptographic controls, Information flow controls, Invasive software. General TermsCryptography, Cryptography Algorithms, Elliptic curve cryptography, , security, RSA, 1. INTRODUCTION Cryptography is the science of secret writing and is an ancient ... and is an ancient art; the first documented use of cryptography ... when an Egyptian scribe used non-standard hieroglyphs in an inscription. Cryptography has many applications as: from diplomatic missives to war-time battle ... medium, which includes just about any network, particularly the Internet. cryptography came. In data and telecommunications, cryptography is necessary when communicating over any Cryptography has many objectives when it is used, such as ? ... that the message was indeed received. The main classification for cryptography algorithms are Public key algorithms and private keys. The cryptography public key is founded on the intractable character of certain ... security comparing to other public key algorithms, for this many cryptography based suits start to integrate elliptic curve to substitute RSA ... using elliptic curves. First described in 1985, [1] Elliptic curve cryptography (ECC) is a new family of public-key system that can ... dedicated in recent years to the standardization of elliptic curve cryptography. . However, there are still some areas where work remains ...
... ECC infrastructure. In this article a simple general introduction to cryptography with focus on elliptic curve algorithm, examine its security, benefits ... elliptic curve angle to be used with the component. 2. CRYPTOGRAPHY Cryptography is one of the major topics to secure information, whether ... information, whether electronic information or any other media. The word Cryptography is taken from a Greek word "Krypto" which means ?secure? ... means "Writing?, means secure or "Secret Writing" . Some define "Cryptography" " as ?The Study of mathematical techniques with related aspects ... as confidentiality, data integrity, entity authentication and data origin authentication". Cryptography has two parts. The first is to transfer "Plaintext" (Massage ... produce a sequence of bits of ciphertext. Some texts classify Cryptography as ?Mechanical Cryptography? ? and ?Electronic Cryptography? ?.Another type of Cryptography algorithm is called the ?Hybrid algorithm?. It combines Symmetric and ... is a good example of ?hybrid algorithms?.A new algorithm of Cryptography tested lately called ?Quantum Cryptography? ? (Quantum cryptography is best known for key distribution) is an effort to ... its security was compromised in retrospect. The genius of quantum cryptography is that it solves the problem of key distribution. A ...
... is called the BB84 system after (Bennett & Brassard, Quantum cryptography: : Public key distribution and coin tossing, 1984 [3]) and ... tossing, 1984 [3]) and its operation is as follows Quantum cryptography in 1992[4]. 2.2 Public key Cryptography Public-key cryptosystems have two primary uses, Encryption, and digital signatures. ... in the sole possession of the intended recipient. Furthermore, public-key cryptography can be used not only for privacy (Encryption), but also ...
... geometry, which in recent years have found numerous applications in cryptography. . An elliptic curve can be defined over any field ... field (e.g., real, rational, complex). However, elliptic curves used in cryptography are mainly defined over finite fields. Elliptic curves are simple ... x y? t ? ?3.2 Elliptic Curves over pZElliptic curve cryptography makes use of elliptic curves in which the variables and ...
... 256Security is not the only attractive feature of elliptic curve cryptography (nsa.gov, 2009). Elliptic curve cryptosystems also are more computationally efficient ... and 5 are for prime fields. Those curves listed provide cryptography equivalent to symmetric encryption algorithms (e.g. AES, DES or SKIPJACK) ... has decided to move to elliptic curve based public key cryptography. . Where appropriate, NSA plans to use the elliptic curves ... NATO nations have all adopted some form of elliptic curve cryptography for future systems to protect classified information throughout and between ... significantly more efficient than private-key ones, whereas for Elliptic curve cryptography, , private-key operations are slightly more efficient than public-key (Entrust, ... to their implementation and use. Various aspects of elliptic curve cryptography have been patented by a variety of people and companies ... 130 [15] patents related to elliptic curves and public key cryptography in general. As a way of clearing the way for ...
... on developing and selling software toolkits that implement elliptic curve cryptography in the field of use. With the toolkit a vendor ... wish to be licensed. 3.4.1 Elliptic curve and Suite B Cryptography [16] Suite B is a set of cryptographic algorithms promulgated ...
... 5 extension that provides for the use of public key cryptography, ... , this has been highlight in RFC5349 - Elliptic Curve Cryptography (ECC) Support for Public [19]. Holding integrity of data storage ... sell sensitive personal data, including Social Security numbers, relatively cheaply. Cryptography is a major enabler of E-Commerce that is so effective, ... is so effective, it sometimes goes unnoticed. The key to cryptography is it allows the integrity of E-Commerce transactions and safeguards ... 4.2.1 Elliptic Curve Comments The use of different techniques of cryptography application as in digital signature, key exchange and encryption seems ... specification defines a profile for the use of Elliptic Curve Cryptography (ECC) public key algorithms in the CMS. The ECC algorithms ...
... security and integrity clientele. 94.3.1 Elliptic Curve Comments Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key cryptosystem, in particular ... for transport layer specified in RFC 4492 - Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) [21] ? ... arrest of the innocent person. 4.4.1 Elliptic Curve Comments Public-key cryptography
... individual?(paraphrased from the "use limitation principle," 4.5.1 Elliptic Curve Comments Cryptography in general cannot stop data profiling without collaboration efforts from ... data profiling without collaboration efforts from different organization,implementing and enforcing cryptography in general and elliptic curve can minimize the large harm ...
... hashEliminate allprivacyinformationMeta dataUserinterfaceProcessing the datawhile its encrypted?Figure 4. Shows the cryptography process position with video surveillance The main question which arises ... personal to access the storage based on access control. However cryptography access control will be most suitable to build such infrastructure ... curve and adopt the Patent ?Authentication Method Employing Elliptic Curve Cryptography? ... ? [24]. ?Disclosed is an authentication method employing elliptic curve cryptography (ECC), applicable to a mobile broadcast TV system having one ... and some of them could be less than 512 bits Cryptography 4.8 Background ChecksIt can uncover illegal criminal records and other ...
... Appropriate protection of the encrypted communication?s endpoints4.9.1 Elliptic Curve Comments Cryptography in general has great achievement to provide privacy issue through ... the right operation platform. In this article the introduction of cryptography
... been discussed follows with the benefits of using elliptic curve cryptography system. The elliptical curve can be used to obtain the ... benefits and challenges of a PKI based on elliptic curve cryptography. . [2] Vittorio, S. 2002 . Quantum Cryptography: : Privacy Through Uncertainty. Retrieved from CSA information company: http://www.csa.com[3] ... company: http://www.csa.com[3] Bennett, C. H., & Brassard, G. 1984. Quantum cryptography: : Public key distribution and coin tossing. Proceedings of IEEE ... C. H., Brassard, G., & Ekert, A. K. 1992. Quantum cryptography. . Scientific American, pp. 50 - 57.[5] Goldreich, O. 2001. ... American, pp. 50 - 57.[5] Goldreich, O. 2001. Foundations of Cryptography: : Volume 1, Basic Tools. Cambridge University Press. [6] Katz, ... [6] Katz, J., & Lindell, Y. 2007. Introduction to Modern Cryptography. . Chapman and Hall/CRC Press. [7] Al-Hamdani, W.A. 1999"Cipher Systems ... in 29-05-1997 [8] Menezes, A. J. 1996. Handbook of Applied Cryptography. . CRC Press. [9] RSALab. 1992. Cryptography FAQ Chapter 2 and Chapter 2. Retrieved from Rsa Lab: ... 203-209. [11] Miller, V. 1985. Use of elliptic curves in cryptography. . CRYPTO 85. [12] Lay, G.-J., & Zimmer, H. G. ... Science; Vol. 877. [13] Rosing, M. 1999. Implementation Elliptic Curve Cryptography. . Manning Pub. [14] Blake, I. F. 2005 . Advances ... [14] Blake, I. F. 2005 . Advances in Elliptic Curve Cryptography. . Cambridge University Press Series: London Mathematical Society Lecture Note ... (No. 317). [15] nsa.gov. 2009. The Case for Elliptic Curve Cryptography. . Retrieved from The National Security Agency Central Security Service ... can be retrieved from http://www.nsa.gov/business/programs/elliptic_curve.shtml[16] nsa.gov. (n.d.). NSA Suite B Cryptography. . Retrieved from The National Security Agency Central Security Service: ... 1999. Biometric Encryption. In R. K. (ed), ICSA Guide to Cryptography (p. chapter 22 in). McGraw-Hill . 13[19] Zhu, L., Jaganathan, ... Jaganathan, K., & Lauter, K. (2008). RFC5349 - Elliptic Curve Cryptography (ECC) Support for Public. faqs.org. [20] Beth, G. (retrived 20009). ... Hawk, C., & Moeller, B. 2006. RFC4492 - Elliptic Curve Cryptography (ECC) Cipher Suites for T. faqs.org. [22] entrust.com. 2008. Elliptic ... benefits and challenges of a PKI based on elliptic curve cryptography. . Retrieved from www.entrust.com: www.entrust.com[23] Wasim Al-Hamdani.2010. Cryptography Based Access Control in Healthcare Web Systems. InfoSec CD 2010, ... M.-C., & Sun, H.-M. (2009). Authentication method employing elliptic curve cryptography. . Retrieved from faqs.org: http://www.faqs.org/patents/[25] FIPS PUB 186-2, 2000. Digital ...
5
July 2016
ITiCSE '16: Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8, Downloads (12 Months): 71, Downloads (Overall): 71
Full text available:
PDF
This paper describes a visualization tool AESvisual that helps students learn and instructors teach the AES cipher. The software allows the user to visualize all the major steps of AES encryption and decryption. The demo mode is useful and efficient for classroom presentation and the practice mode provides the user ...
Keywords:
cryptography, visualization
CCS:
Cryptography
Keywords:
cryptography
Primary CCS:
Cryptography
References:
A. McAndrew. Teaching Cryptography with Open-Source Software. In Proceedings of the 39th ACM SIGCSE Technical Symposium on Computer Science Education, pages 325--329, 2008.
W. Stallings. Cryptography and Network Security. Prentice-Hall, third edition, 2003.
W. Trappe and L. C. Washington. Introduction to Cryptography with Code Theory. Prentice-Hall, 2002.
Full Text:
... the process of learning the cipher.AES appears in nearly every cryptography and computersecurity textbook [6, 7]. Many tools are available rangingfrom ... 5 is our conclusion.2. COURSE INFORMATIONAESvisual was used in a cryptography course, MA3203Introduction to Cryptography, , that is offered out of the De-partment of Mathematical ... level course that gives a basicintroduction to the field of cryptography. . This course cov-ers classical cryptography, , the Data Encryption Standard(DES), the Advanced Encryption Standard (AES), ... Standard (AES), the RSAalgorithm, discrete logarithms, hash functions, and ellipticcurve cryptography. . For each cryptosystem, we study how itwas designed, why ... of AES makes it an essential algo-rithm for any introductory cryptography student to under-stand. Therefore, it is an important piece of ...
... V. Rijmen. The Design of Rijndael.Springer, 2002.[4] A. McAndrew. Teaching Cryptography withOpen-Source Software. In Proceedings of the 39th ACMSIGCSE Technical Symposium ... Conference on Computer Theory andApplications, pages 85?93, 2008.[6] W. Stallings. Cryptography and Network Security.Prentice-Hall, third edition, 2003.[7] W. Trappe and L. ...
6
November 2000
CCS '00: Proceedings of the 7th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 92
Downloads (6 Weeks): 2, Downloads (12 Months): 24, Downloads (Overall): 570
Full text available:
PDF
Keywords:
simulatability, cryptography
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
cryptography
Primary CCS:
Computational complexity and cryptography
Cryptography
References:
M. Abadi, P. Rogaway, Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption), IFIP International Conferences on Theoretical Computer Science (IFIP TCS2000), Sendai, Japan, August 2000 (to appear)]]
R. Canetti, Security and Composition of Multiparty Cryptographic Protocols, J. of Cryptology 13/1 (2000) 143{202 (preliminary version in Theory of Cryptography Library 98-18, 1998)]]
Full Text:
... are important for putting formal veri?-cation methods for systems using cryptography on a soundbasis.Categories and Subject DescriptorsE.3 [Data]: Data Encryption; F.1.2 ... Com-putationGeneral TermsSecurity, Theory, Veri?cationKeywordsCryptography, Simulatability1. INTRODUCTIONSecurity proofs for systems involving cryptography aregetting increasing attention in theory and practice, and theyare used ... the real cryptographic primi-tives as de?ned and sometimes proven in cryptography. . Themain issue is not even that one will somehow ... sense [26].1.2 Faithful AbstractionThe problem can be approached from both sides|cryptography can try to o?er stronger primitives closer tothe typical abstractions, ...
weaker abstractions that are easier to ful?l by ac-tual cryptography. . (Our examples in [24, 25] belong to thesecond approach.) ... It should be proven that dashedarrows follow automatically.1.3 What does Cryptography Gain from Ab-stractions?Cryptographers may ask why one should bother with ... not duplicate the overview from [26].The main abstraction approach in cryptography is sim-ulatability: One speci?es an ideal system that has all ...
... can be abstract, unless thehigher layer in a composition uses cryptography itself. Inparticular, the integrity properties in (a) are accessible tomodel ...
... di?erent sets of speci?ed ports, becauserequirements of various parties in cryptography are oftenmade for di?erent trust assumptions (typically, every partyis assumed ...
7
April 2017
IoTPTS '17: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13, Downloads (12 Months): 44, Downloads (Overall): 44
Full text available:
PDF
Some lattice-based public key cryptosystems allow one to transform ciphertext from one lattice or ring representation to another efficiently and without knowledge of public and private keys. In this work we explore this lattice transformation property from cryptographic engineering viewpoint. We apply ciphertext transformation to compress Ring-LWE ciphertexts and to ...
Keywords:
lightweight cryptography, post-quantum cryptography, ring-LWE encryption, lattice cryptography
Title:
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
CCS:
Cryptography
Keywords:
lightweight cryptography
post-quantum cryptography
lattice cryptography
Abstract:
... or its security parameters. Such flexibility is unique to lattice-based cryptography and may find additional, unique real-life applications.</p> <p>Ciphertext compression can ... 40% at equivalent security level, while also enabling public key cryptography on previously unreachable ultra-lightweight platforms.</p> <p>The experimental public key encryption ...
Primary CCS:
Cryptography
References:
L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone. Report on post-quantum cryptography. NISTIR 8105, April 2016. URL: http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf,href http://dx.doi.org/10.6028/NIST.IR.8105pathdoi:10.6028/NIST.IR.8105.
J. Jonsson and B. Kaliski. Public-key cryptography standards (PKCS)#1: RSA cryptography specifications version 2.1. IETF RFC 3447, February 2003.href http://dx.doi.org/10.17487/RFC3447pathdoi:10.17487/RFC3447.
D. Moody. Post-quantum cryptography: NIST's plan for the future. Talk given at PQCrypto '16 Conference, 23--26 February 2016, Fukuoka, Japan, February 2016. URL: https://pqcrypto2016.jp/data/pqc2016_nist_announcement.pdf.
NIST. Submission requirements and evaluation criteria for the post-quantum cryptography standardization process. Official Call for Proposals, National Institute for Standards and Technology, December 2016. URL: http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-for-proposals-final-dec-2016.pdf.
T. Pöppelmann, T. Oder, and T. Güneysu. High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers. In K. Lauter and F. Rodríguez-Henríquez, editors, LATINCRYPT 2015, volume 9230 of LNCS, pages 346--365. Springer, 2015. URL: http://eprint.iacr.org/2015/382,href http://dx.doi.org/10.1007/978--3--319--22174--8_19pathdoi:10.1007/978--3--319--22174--8_19.
Full Text:
... procedure or its security parameters. Such flexibilityis unique to lattice-based cryptography and may find addi-tional, unique real-life applications.Ciphertext compression can significantly ... than 40% at equivalent security level,while also enabling public key cryptography on previouslyunreachable ultra-lightweight platforms.The experimental public key encryption and authentica-tion ... Publication rights licensed to ACM.ISBN 978-1-4503-4969-7/17/04. . . $15.00DOI: http://dx.doi.org/10.1145/3055245.3055254KeywordsPost-Quantum Cryptography, , Lattice Cryptography, , Ring-LWE Encryption, Lightweight Cryptography1. INTRODUCTIONPolynomial-time Quantum algorithms for attacking ... Standards and Technology (NIST) has initiated aneffort to standardize post-quantum cryptography (PQC) [9].The algorithms should be implementable on a wide range ...
... D. Moody, R. Peralta,R. Perlner, and D. Smith-Tone. Report onpost-quantum cryptography. . NISTIR 8105, April2016. URL: http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf, doi:10.6028/NIST.IR.8105.[10] CNSS. Use of ...
... volume 6110of LNCS, pages 1?23. Springer, 2010.doi:10.1007/978-3-642-13190-5_1.[27] D. Moody. Post-quantum cryptography: : NIST?s planfor the future. Talk given at PQCrypto ?16Conference, ... 2014.doi:10.1007/978-3-662-43414-7_4.[33] T. Po ppelmann, T. Oder, and T. Gu neysu.High-performance ideal lattice-based cryptography on8-bit ATxmega microcontrollers. In K. Lauter andF. Rodr ?guez-Henr ?quez, editors, LATINCRYPT ...
8
May 2013
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2, Downloads (12 Months): 23, Downloads (Overall): 152
Full text available:
PDF
This paper focus on incremental cryptographic schemes that solve the privacy problem introduced by Bellare, Goldreich and Goldwasser. To our knowledge, none of the schemes designed so far provide simultaneously strong privacy guarantees and byte-wise incremental operations. We propose a new method that extends a block-wise incremental cryptographic scheme into ...
Keywords:
parallel cryptography, incremental cryptography, perfect privacy
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
parallel cryptography
incremental cryptography
Primary CCS:
Computational complexity and cryptography
Cryptography
References:
Mihir Bellare, Oded Goldreich, and Shafi Goldwasser. Incremental cryptography: The case of hashing and signing. In CRYPTO, 1994.
Mihir Bellare, Oded Goldreich, and Shafi Goldwasser. Incremental cryptography and application to virus protection. In Proc. of the 27th Ann. ACM Symp. on the Theory of Computing, pages 45--56. ACM Press, 1995.
Daniele Micciancio. Oblivious data structures: Applications to cryptography. In In Proceedings of the 29th Annual ACM Symposium on the Theory of Computing, pages 456--464. ACM Press, 1997.
Full Text:
... the number ofoperations to perform when applying the conjugate algorithm.KeywordsIncremental cryptography; ; Perfect privacy; Parallel cryptographyCategories and Subject DescriptorsE.3 [Data]: Data ... DescriptorsE.3 [Data]: Data Encryption; D.4.6 [Software]: Security and Pro-tection1. INTRODUCTIONIncremental cryptography, , introduced in [1, 2, 3], is used tomaintain up-to-date, ... Then,security considerations are discussed in Section 4.2. BACKGROUND AND DEFINITIONS2.1 Cryptography and documents updateCryptographic schemes take as input a document D ...
... companion paper.5. REFERENCES[1] Mihir Bellare, Oded Goldreich, and Shafi Goldwasser.Incremental cryptography: : The case of hashing and signing.In CRYPTO, 1994.[2] Mihir ... signing.In CRYPTO, 1994.[2] Mihir Bellare, Oded Goldreich, and Shafi Goldwasser.Incremental cryptography and application to virusprotection. In Proc. of the 27th Ann. ...
... Workshops, pages 263?272, 2011.[10] Daniele Micciancio. Oblivious data structures: Applicationsto cryptography. . In In Proceedings of the 29th Annual ACMSymposium on ...
9
September 2009
InfoSecCD '09: 2009 Information Security Curriculum Development Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9, Downloads (12 Months): 26, Downloads (Overall): 268
Full text available:
PDF
This paper examines the missing factors in cryptography algorithms curriculum designed to teach Information security (information assurance) to students. Normally, there are four different aspects to organizing a cryptography curriculum for a curriculum developer, drawing from the work inspiration of their background, their field of study, and their target degree. ...
Keywords:
cryptography curriculum for information security, cryptography curriculum for mathematics, cryptography curriculum, cryptography curriculum for computer science, applied cryptography, standard cryptography
CCS:
Cryptography
Keywords:
cryptography curriculum for information security
cryptography curriculum for mathematics
cryptography curriculum
cryptography curriculum for computer science
applied cryptography
standard cryptography
Abstract:
<p>This paper examines the missing factors in cryptography algorithms curriculum designed to teach Information security (information assurance) to ... students. Normally, there are four different aspects to organizing a cryptography curriculum for a curriculum developer, drawing from the work inspiration ... their field of study, and their target degree. Indeed, a cryptography course can be taught in four different departments: Computer Science, ... development and teaching aspects for these four different fields, where cryptography could be presented in a way to serve the knowledge ...
Title:
Missing factors in teaching cryptography algorithms for information security tracks
References:
Wasim A Al-Hamdani, and I. Griskell. 2005. A Proposed Curriculum of Cryptography Courses: InfoSec 2005 Kennesaw, 2005. pp. 4--11.
N. Paul Schembari. 2007. Hands-On Crypto": Experiential Learning in Cryptography": Proceedings of the 11th Colloquium for Information Systems Security Education.
Wasim A Al-Hamdani Cryptography: lecture notes: unpolished lecture notes, 1988--2009.
Wasim A Al-Hamdani Applied Cryptography in E-mail Service and Web Services, chapter in Applied Cryptography for Cyber Security and Defense: Information Edit by Dr. Hamid R. Nemati and Dr. Li Yang. Encryption and Cyphering New York IGI Global, Summer 2009.
Nsa.gov. NSA Suite B Cryptography, nsa.gov. 2009. Can be retrieved from http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml
Wasim A Al-Hamdani Cryptography Algorithms Standards: Guidelines for Management chapter in Cengage Learning Readings and Cases in the Management of Information Security edit by Herbert J. Mattord and Michael E. Whitman, Cengage, 2010.
Full Text:
Microsoft Word - 04-AL-Hamdani.docx15 Missing Factors in Teaching Cryptography Algorithms for Information Security Tracks Wasim A Al-Hamdani, PhD Information ... 40601 wasim.al?hamdani@kys.edu ABSTRACT This paper examines the missing factors in cryptography algorithms curriculum designed to teach Information security (information assurance) to ... students. Normally, there are four different aspects to organizing a cryptography curriculum for a curriculum developer, drawing from the work inspiration ... their field of study, and their target degree. Indeed, a cryptography course can be taught in four different departments: Computer Science, ... development and teaching aspects for these four different fields, where cryptography could be presented in a way to serve the knowledge ... and Protection- Authentication, Insurance, Invasive software, Physical security General Terms Cryptography curriculum, cryptography curriculum for information security Key words Cryptography curriculum, cryptography curriculum for information security, cryptography curriculum for computer science, cryptography curriculum for mathematics, applied cryptography, , standard cryptography 1. INTRODUCTION A normal cryptography course consists of the following different topics: ?classical algorithms, block ... prerequisite. Whatever the case, the main issue in presenting the cryptography curriculum to the type of student backgrounds and their track ... article in which we will present the missing factors in cryptography curriculum for information security students. In particular, this paper will ... security students. In particular, this paper will present a normal cryptography curriculum and focus on how presenting the same curriculum to ... Finally, this article will present the missing elements for teaching cryptography curriculum for information security students. Teaching cryptography to mathematic background students normally based on algorithm analysis in ... algorithm analysis in complexity, group, and field theories. While teaching cryptography to computer science students normally based on programming approaches for ... hardware environment and embedded systems. The last categories are the cryptography for information security students which should be expose to deferent ... security students required more on the practical, and application of cryptography in: Access control, data storage, communication and daily operations? Figure ... 25-26, 2009, Kennesaw, GA, USA. Copyright 2009 ACM 978-1-60558-661-8/09/09?$10.00 16 Figure 1. Four tracks for teaching cryptography The article starts by reviewing cryptography curriculum, then discusses Kolb?s learning model with emphases on active ... learning model with emphases on active experimentation (AE) learning for cryptography with four different tracks, and then finally presents the missing ... the missing learning factors for the information security track. 2. CRYPTOGRAPHY CURRICULUM A good cryptography
... algorithm, Goldwasser-Micali probabilistic algorithm, Elliptic curve algorithm Digital Signature: public-key cryptography standards (PKCS #1), The ElGamal signature, digital signature algorithm (DSA), ... plaintext recovery, Nyberg-Rueppel, One-time digital signatures and other signature algorithms Cryptography Hash Function: Unkeyed hash functions (MDCs), Keyed hash functions (MACs) ... zero-knowledge protocols, guillou-Quisquater identification protocol, schnorr identification protocol More on Cryptography Algorithms Applications We find that the first part, ?the mathematics ... first part, ?the mathematics background?, is sometimes moved in the cryptography curriculum to be presented in another course as ?number theory?, ... another course as ?number theory?, while others call it ?mathematical cryptography? ? with greater emphases on P, NP analysis, complexity, and ... problem. Such curriculums are presented as a prerequisite for the cryptography coursework. 3. CRYPTOGRAPHY EXPERIENTIAL LEARNING The main issue is, ?How to present these ... must keep in mind that the best learning method for cryptography as presented in [2] is ?experiential learning and security lab ... needs is experimental learning as it is very essential. With cryptography, , this type of learning could be gained through: ? ... some steps of a digital signature, one 17 step of hybrid cryptography, , key management, simple key space searching algorithms, or brute ...
... through network or packet software analysis. Therefore, any course in cryptography for computer science or mathematics or computer engineering has to ... = AE and as shown in Table 2. Table 2: Cryptography Student Outcome Track Active Experimentation (AE) Student Outcome Computer science ... Student Outcome Computer science Hands-on paper and pencil in implementing cryptography algorithms through programming languages To be: Cryptography software developers, analysts, engineers Mathematics Hands-on paper and pencil with ... with either logic design and assemble language implementation to support cryptography implementation and embedded cryptography system Cryptography engineers and embedded system engineers 4. INFORMATION SECURITY TRACK The ... 4. INFORMATION SECURITY TRACK The main issue facing instructors for cryptography in the information security track is that these students are ... the information security track is that these students are not cryptography developers or mathematical analysts, these students are the actual user, ... curriculum elements for information security track are: Component A and Cryptography Application in: email service, web service and Cryptography Standards. Table 3: Information Security Student Outcome Track Active Experimentation ... (AE) Student Outcome Information security Hands-on paper and pencil and cryptography applications with cryptography standards To be: Cryptography user, decision maker 4.1 Cryptography Applications This component regarding cryptography applications will cover e-mail secure protocols with an emphasis on ... e-mail secure protocols with an emphasis on the type of cryptography used [7]. In particular: Internet Message Access Protocol (IMAP) with ...
... Levels [8] MIME SECURITY WITH PRETTY GOOD PRIVACY (PGP) 4.2 Cryptography in Web Application This to cover cryptography sued with web application and these are : Secure Sockets ... E-mail reputation MIME Object Security Services HIPAA secure e-mail 4.3 Cryptography in Web Services [7] Web services securely to the security ... between Services and security of Infrastructures for Web Services. 4.4 Cryptography Application in Communication and Network Protocols In this part the ... the seven layers with emphasis on where to integrate the cryptography protocol. Some time is very useful to introduce the following ... Transfer Protocol),Telnet (Telnet Remote Protocol) With discussion how to integrate cryptography, , authentication with them, in addition to brief discussion on ... authentication with them, in addition to brief discussion on IPSec cryptography suits or ? Kerberos ? Point to Point Protocol ? ... ? Point to Point Protocol ? Transport Layer Security 4.5 Cryptography Standards [9] In this section the students exposed to the ... [9] In this section the students exposed to the existing cryptography ... standards exists in the market, and this covers first why cryptography standards? Benefit of standards, what are the standards buddies existed ... standardization organizations: Institute of Electrical and Electronics Engineers (IEEE), Public-Key Cryptography ... Standards (PKCSs), Internet Engineering Task Force (IETF), Standards for Efficient Cryptography Group (SECG), Third Generation Partnership Project (3GPP), and European Telecommunications ... RFC, such as: ? RFC 3278: Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). S. Blake-Wilson, D. ... Kobayashi, Y. Wang. April 2005. 19 ? RFC 4492: Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). S. Blake-Wilson, ... August 2008 And some as: - ANSI X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature ... Algorithm (ECDSA), approved January 1999. - ANSI X9.63, Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport ... Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography, , Working Draft ver. 1999, 1, 8. - SEC1 of ... 1999, 1, 8. - SEC1 of Certicom Research, Elliptic Curve Cryptography, , v1.0 (2000, 9, 20) - SEC2 of Certicom Research, ...
Cryptography Domain Parameters, v1.0 (2000) - GEC2, Test Vectors for SEC1 ...
... 2005. - RFC 4055 Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate ... Sturgeon. May 2005. The most important issue in presenting the Cryptography standards is : student must know where to find these ... to find the standards The most essential issues in presenting cryptography application and Cryptography standards are: ? Is the course for undergraduate or graduate? ... or graduate? o For undergraduate number of hours to present cryptography application are more than for the standards o For graduate ... standards o For graduate course number of hours to present cryptography ... application are equal to the standards o The two elements cryptography application and Cryptography standards, should be last part of the course ? Some ... should be last part of the course ? Some time cryptography course are divided into courses, introduction and advance, in this ... advance, in this case the second course should be for cryptography applications and standards. 5. CONCLUSION In this article we present ... CONCLUSION In this article we present the missing factors in Cryptography algorithms curriculum for information security track, since the student outcome ... it believes introduce them will increase the student understanding on cryptography uses in information security. The two factors are: ? Cryptography applications , and ? Cryptography standards Its believed information security student should not expose in ... expose in depth for the mathematical pr programming issue with cryptography rather than the real use of cryptography in different applications. Introduce the students to the cryptography standards we expose them to actual standardizations in which they ... A Al-Hamdani, and I. Griskell. 2005. A Proposed Curriculum of Cryptography Courses: InfoSec 2005 Kennesaw, 2005. pp. 4-11. [2] N. Paul ... 4-11. [2] N. Paul Schembari.2007. Hands-On Crypto?: Experiential Learning in Cryptography ? : Proceedings of the 11th Colloquium for Information Systems ... Education, Vols. 77, pp. 291-296 . [6] Wasim A Al-Hamdani Cryptography : lecture notes : unpolished lecture notes , 1988-2009 . ... lecture notes , 1988-2009 . [7] Wasim A Al-Hamdani Applied Cryptography in E-mail Service and Web Services, chapter in Applied Cryptography for Cyber Security and Defense: Information Edit by Dr. Hamid ... York IGI Global, Summer 2009. [8] Nsa.gov. NSA Suite B Cryptography, , nsa.gov. 2009. Can be retrieved from http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml [9] Wasim ... 2009. Can be retrieved from http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml [9] Wasim A Al-Hamdani Cryptography Algorithms Standards: Guidelines for Management chapter in Cengage Learning Readings ...
10
June 2007
STOC '07: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Publisher: ACM
Bibliometrics:
Citation Count: 23
Downloads (6 Weeks): 4, Downloads (12 Months): 20, Downloads (Overall): 397
Full text available:
PDF
We give an exponential separation between one-way quantum and classical communication protocols for twopartial Boolean functions, both of which are variants of the Boolean Hidden Matching Problem of Bar-Yossef et al. Earlier such an exponential separation was known only for a relational version of the Hidden Matching Problem. Our proofs ...
Keywords:
communication complexity, quantum, cryptography
CCS:
Computational complexity and cryptography
Keywords:
cryptography
Abstract:
... of this separation. In particular, in the bounded-storage model of cryptography we exhibita scheme that is secure against adversaries with a ...
Primary CCS:
Computational complexity and cryptography
Title:
Exponential separations for one-way quantum communication complexity, with applications to cryptography
Full Text:
... of this separation. In par-ticular, in the bounded-storage model of cryptography weexhibit a scheme that is secure against adversaries with acertain ...
... second proof is closely related to the bounded storagemodel in cryptography. . It was introduced by Maurer [22]with the aim of ...
... (1?2?k)-secure againstan adversary with O(k log(n)/?) qubits.Note that normally in cryptography one wants ?-securityfor exponentially small ?. Our classical bounded-storagescheme is ...
11
October 2008
MSWiM '08: Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 4, Downloads (Overall): 132
Full text available:
PDF
Recent large scale disasters have awaken governments at home and abroad to their needs for preparedness to support homeland security and public safety. First responders of various agencies are often on the frontline to assist in managing these events to protect lives and property. The effectiveness of their mission is ...
Keywords:
security, cryptography, multimedia
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
cryptography
Abstract:
... examine combinatorial key solutions within the scopes of symmetric key cryptography and public key cryptography and how they fare under resource limitations and possible threats. ...
Primary CCS:
Computational complexity and cryptography
Cryptography
Full Text:
... examine combinatorial key solutions within the scopes of symmetric key cryptography and public key cryptography and how they fare under resource limitations and possible threats. ...
12
November 2006
VizSEC '06: Proceedings of the 3rd international workshop on Visualization for computer security
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2, Downloads (12 Months): 19, Downloads (Overall): 406
Full text available:
PDF
Visualization can be an effective means for analyzing security data and teaching students different concepts about various security algorithms. At the Air Force Academy, interactive visualizations are used to teach ciphers to students in a cryptography course. In the course of preparing student visualizations about the RC4 cipher characteristics, an ...
Keywords:
cryptography, algorithm analysis, visualization
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
cryptography
Abstract:
... visualizations are used to teach ciphers to students in a cryptography course. In the course of preparing student visualizations about the ...
Primary CCS:
Computational complexity and cryptography
Cryptography
References:
Schneier B., "Section 17.1 RC4," Applied Cryptography, Second Edition, John Wiley & Sons, 1996.
Full Text:
... visualizations are used to teach ciphers to students in a cryptography course. In the course of preparing student visualizations about the ... E.3 [Data]: Data Encryption. General Terms: Experimentation, Security. Keywords Visualization, Cryptography, , Algorithm Analysis. 1. INTRODUCTION Visualization is a powerful tool ... Alexandria, Virginia, USA. Copyright 2006 ACM 1-59593-549-5/06/0011...$5.00. Similarly, in the Cryptography class we have developed and used a set of interactive ...
... S-array initialization was far from random! Initial search of the cryptography literature did not reveal this anomaly as common knowledge. 92 ... raising the issue. This shows the power of visualization in cryptography
... been published outside a thesis. It even has applications beyond cryptography, , because it will arise any time someone tries to ... Inc., Mar. 12, 1992. [4] Schneier B., "Section 17.1 RC4,"Applied Cryptography, , Second Edition, John Wiley & Sons, 1996. 93[5] Schweitzer ...
13
October 2004
ACM SIGCOMM Computer Communication Review: Volume 34 Issue 5, October 2004
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 27, Downloads (Overall): 773
Full text available:
PDF
We demonstrate high data-rate quantum-noise{protected data encryption through optical fibers using coherent states of light. Specifically, we demonstrate 650Mbps data encryption through a 10Gbps data-bearing, in-line amplified 200km-long line. In our protocol, legitimate users (who share a short secret-key) communicate using an M-ry signal set while an attacker (who does ...
Keywords:
quantum cryptography, data encryption
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
quantum cryptography
Primary CCS:
Computational complexity and cryptography
Cryptography
References:
B. Schneier. Applied Cryptography, 2nd Edition. John Wiley and Sons, Inc., New York, 1996.
C. H. Bennett and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pages 175--179, 1984.
A. K. Ekert. Quantum cryptography based on Bell's theorem. Physics Review Letters, 67, 1991.
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden. Quantum cryptography. Reviews of Modern Physics, 74:145--195, 2002.
W. Tittel, J. Brendel, H. Zbinden, and N. Gisin. Quantum cryptography using entangled photons in energy-time Bell states. Physics Review Letters, 84, 2000.
T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger. Quantum cryptography with entangled photons. Physics Review Letters, 84, 2000.
H. P. Yuen. KCQ: A new approach to quantum cryptography I. General principles and qumode key generation. quant-ph/0311061, 2004.
E. Corndorf, G. Barbosa, C. Liang, H. P. Yuen, and P. Kumar. High-speed data encryption over 25km of fiber by two-mode coherent-state quantum cryptography. Optics Letters, 28:2040--2042, 2003.
E. Corndorf, G. S. Kanter, C. Liang, and P. Kumar. Data encryption over an inline-amplified 200km-long WDM line using coherent-state quantum cryptography. In Proceedings of the SPIE Defense and Security Symposium, Orlando, FL, April 2004.
Full Text:
... are established andcarefully considered.Categories and Subject DescriptorsE.3 [Data Encryption]General TermsSecurityKeywordsQuantum cryptography, , Data encryption1. INTRODUCTIONFor more than twenty years, physicists and ...
... whose security either a) relys solely on unprovencomputational complexity (public-key cryptography) ), or b)on an unspecified level of information-theoretic security(block/stream ciphers), ...
... communications. J.Am. I. Electrical En., 45:109, 1926.[2] B. Schneier. Applied Cryptography, , 2nd Edition. JohnWiley and Sons, Inc., New York, 1996.[3] ... and SignalProcessing, Bangalore, India, pages 175?179, 1984.[5] A.K. Ekert. Quantum cryptography based on Bell?stheorem. Physics Review Letters, 67, 1991.[6] N. Gisin, ... 1991.[6] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden.Quantum cryptography. . Reviews of Modern Physics,74:145?195, 2002.[7] W. Tittel, J. Brendel, ... 2002.[7] W. Tittel, J. Brendel, H. Zbinden, and N. Gisin.Quantum cryptography using entangled photons inenergy-time Bell states. Physics Review Letters, 84,2000.[8] ... Jennewein, C. Simon, G. Weihs, H. Weinfurter, andA. Zeilinger. Quantum cryptography with entangledphotons. Physics Review Letters, 84, 2000.[9] H.P. Yuen. KCQ: ...
14
June 2002
SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 0, Downloads (12 Months): 15, Downloads (Overall): 1,164
Full text available:
PDF
The need for access control in a hierarchy arises in several different contexts. One such context is managing the information of an organization where the users are divided into different security classes depending on who has access to what. Several cryptographic solutions have been proposed to address this problem --- ...
Keywords:
cryptography, access control, hierarchy
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
cryptography
Primary CCS:
Computational complexity and cryptography
Cryptography
References:
W. Stallings. Cryptography and Network Security: Principles and Practice. Prentice-Hall, second edition, 1999.
Full Text:
... in-terested reader to any book on number theory [13] or cryptography[
... Discrete Introduction.Brooks/Cole, Pacific Grove, CA, 1st edition, 2000.[20] W. Stallings. Cryptography and Network Security:Principles and Practice. Prentice-Hall, second edition, 1999.[21] M. ...
15
April 1984
Communications of the ACM: Volume 27 Issue 4, April 1984
Publisher: ACM
Bibliometrics:
Citation Count: 25
Downloads (6 Weeks): 2, Downloads (12 Months): 26, Downloads (Overall): 838
Full text available:
PDF
Keywords:
cryptographic protocols, cryptography
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
cryptography
References:
Diffie, W. and Hellman, M. New directions in cryptography. IEEE Trans. Inf. Theory, (Nov. 1976).
Full Text:
... REFERENCES 1. Diffie, W. and Hellman, M. New directions in cryptography. . IEEE Trans. Inf. Theory, (Nov. 1976). 2. Rivest, R., ... and protection General Term: Security Additional Key Words and Phrases: cryptography, , cryptographic protocols Received 4/82; revised 10/83; accepted 11/83 Author's ...
16
January 2014
ITCS '14: Proceedings of the 5th conference on Innovations in theoretical computer science
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 1, Downloads (12 Months): 13, Downloads (Overall): 92
Full text available:
PDF
We show how to securely obfuscate a new class of functions: conjunctions of NC 0 d circuits . These are functions of the form C (→/ x ) = ∧ m i=1 C 1 (→/ x ), where each C 1 is a boolean NC 0 d circuits circuit, whose ...
Keywords:
cryptography, program obfuscation
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
cryptography
Primary CCS:
Computational complexity and cryptography
Cryptography
References:
D. Boneh and A. Silverberg. Applications of multilinear forms to cryptography. IACR Cryptology ePrint Archive, 2002:80, 2002.
U. Maurer. Abstract models of computation in cryptography. In IMA Int. Conf., pages 1--12, 2005.
Full Text:
... obfuscation is a centralquestion in the theory and practice of cryptography. . Despitethe problem's importance, very few techniques or heuristicswere known. ...
... 2010.[5] D. Boneh and A. Silverberg. Applications ofmultilinear forms to cryptography. . IACR CryptologyePrint Archive, 2002:80, 2002.[6] Z. Brakerski and G. ...
17
September 2006
Journal on Educational Resources in Computing (JERIC): Volume 6 Issue 3, September 2006
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 33, Downloads (Overall): 838
Full text available:
PDF
Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganzúa (picklock in Spanish) is an application designed to assist the cryptanalysis of ciphertext obtained with monoalphabetic or polyalphabetic ciphers. It can use ...
Keywords:
classical cryptography, Cryptology
CCS:
Computational complexity and cryptography
Cryptography
Keywords:
classical cryptography
Primary CCS:
Computational complexity and cryptography
Cryptography
References:
Cummings, J. Topics in applied mathematics: cryptography, Mathematics Department, Carnegie Mellon University, http://www.math.cmu.edu/users/jcumming/teaching/crypto/
Kerckhoffs, A. 1883, La cryptographie militaire, Journal des Sciences Militaires IX, 5 (Jan.), 161 (Feb.) available in Fabien Petitcolas: http://www.petitcolas.net/fabien/kerckhoffs/index.html
Weibel, C. 2002, Math 395: (An introduction to cryptography), Mathematics Department, Rutgers University, http://www.math.rutgers.edu/courses/395/s02/395syllabus.html
Full Text:
... monoalphabetic ciphers are useful to introduce many concepts, like sym-metric cryptography, , ciphertext and plaintext. They can also be used to ...
... M. Mike?s cryptanalysis tool, http://cipherlogic.army.ca/cgi-bin/cryptanalysis.plCummings, J. Topics in applied mathematics: cryptography, , Mathematics Department, CarnegieMellon University, http://www.math.cmu.edu/users/jcumming/teaching/crypto/Galaviz, J. and Magidin, A. ... D. 1999. The Codebreakers, 2nd. ed., Scribner.Kerckhoffs, A. 1883, La cryptographie militaire, Journal des Sciences Militaires IX, 5 (Jan.), 161(Feb.) available ... Java internationalization, http://java.sun.com/j2se/corejava/intl/index.jspWeibel, C. 2002, Math 395: (An introduction to cryptography) ), Mathematics Department, Rut-gers University, http://www.math.rutgers.edu/courses/395/s02/395syllabus.htmlW3C (World Wide Web Consortium), ...
18
March 2017
SIGCSE '17: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education
Publisher: ACM
Cryptography is a major area of study that provides mechanisms to achieve confidentiality, integrity, authenticity, and non-repudiation in information and computer security. For many not in the area of cryptography, teaching cryptography may be a challenge due to the mathematically heavy background underlying the subject. For students it may be ...
Keywords:
cryptography, hash functions, introductory cryptography, digital signatures, symmetric key cryptography, public key cryptography, public key infrastructure (PKI)
CCS:
Cryptography
Keywords:
cryptography
introductory cryptography
symmetric key cryptography
public key cryptography
Abstract:
<p>Cryptography is a major area of study that provides mechanisms to ... and computer security. For many not in the area of cryptography, , teaching cryptography may be a challenge due to the mathematically heavy background ... subject. For students it may be intimidating to read about cryptography with all the terminology new to them. This workshop provides ... workshop provides an introduction to basic functions and terminology of cryptography without going into the details of the specific implementations and ... workshop includes four modules focusing on four main mechanisms of cryptography; ; namely, symmetric key encryption, public key cryptography, , hash functions, and digital signatures and certificates. Each module ... for assessment. Educators who want to introduce computer security and cryptography early in their curriculum and students and educators who want ... students and educators who want to learn the basics of cryptography would benefit from this workshop. A laptop is needed for ...
Primary CCS:
Cryptography
Title:
Modules for Integrating Cryptography in Introductory CS and Computer Security Courses (Abstract Only)
19
October 2006
ACM Transactions on Computational Logic (TOCL): Volume 7 Issue 4, October 2006
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2, Downloads (12 Months): 15, Downloads (Overall): 266
Full text available:
PDF
The replacement (or collection or choice ) axiom scheme BB(Γ) asserts bounded quantifier exchange as follows: ∀ i < | a | ∃ x < a φ( i , x ) → ∃ w ∀ i < | a |φ( i ,[ w ] i ), for φ in the ...
Keywords:
Bounded arithmetic, PV, cryptography
CCS:
Computational complexity and cryptography
Keywords:
cryptography
Primary CCS:
Computational complexity and cryptography
Full Text:
... Model theoryGeneral Terms: TheoryAdditional Key Words and Phrases: Bounded arithmetic, cryptography, , PV1. INTRODUCTIONWe are concerned with the strength of various ...
20
October 2010
Q2SWinet '10: Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 26, Downloads (Overall): 283
Full text available:
PDF
In the last few years RFID technology widespread. This technology can be found in each field of our daily life, e.g. supply-chain management, libraries, access management etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods can be ...
Keywords:
authentication, elliptic curve cryptography, rfid
Title:
Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems
CCS:
Cryptography
Keywords:
elliptic curve cryptography
Abstract:
... this environment. In this paper we present our elliptic curve cryptography based authentication protocol which protects against the well-known attacks. We ...
Primary CCS:
Cryptography
References:
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, Public-Key Cryptography for RFID-Tags, Pervasive Computing and Communications Workshops, IEEE International Conference on, pp. 217--222, ISBN: 0-7695-2788-4, Los Alamitos, CA, USA, 2007.
Győző Gódor, Norbert Giczi and Sándor Imre. Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems - Performance Analysis by Simulations, IEEE International Conference on Wireless Commnications, Netorking and Information Security, pp. 650--657, Beijing, China, 2010.
M. Girault, L. Juniot and M. J. B. Robshaw, The Feasibility of On-the-Tag Public Key Cryptography, Workshop on RFID Security, RFIDSec'07, 2007. Access on: http://rfidsec07.etsit.uma.es/slides/papers/paper-32.pdf
M. McLoone and M. J. B. Robshaw, Public Key Cryptography and RFID Tags, LNCS 4377/2006, pp. 372--384, Springer Berlin / Heidelberg, 2007.
Axel Poschmann, Matt Robshaw, Frank Vater, and Christof Paar, Lightweight Cryptography and RFID: Tackling the Hidden Overheads, 7th International Conference on Information Security and Cryptology 2009 - ICISC 2009, Seoul, Korea, 2009.
Full Text:
Q2SWinet_2010_ecc.dviElliptic Curve Cryptography Based AuthenticationProtocol for Small Computational Capacity RFID SystemsGyo?zo? G dorDepartment ofTelecommunicationsBudapest ... in this environment. In this paper wepresent our elliptic curve cryptography based authenticationprotocol which protects against the well-known attacks. Wegive a ... [Data Encryption]: Public key cryptosystemsGeneral TermsAlgorithms, Design, SecurityKeywordsAuthentication, Elliptic Curve Cryptography, , RFID1. INTRODUCTIONSince the first radio signal had been sent ... RFID Tags were developed hereby allowingdevelopment of simple symmetric key cryptography basedauthentication protocols [1], [2], [3], [4], [5].In these days such ...
... protocol needs high computational capacity.Meanwhile the usage of elliptic curve cryptography is betterchoice while smaller key size guarantees the same securitylevel.We ... USA, 2007.[11] Gyo?zo? Go dor, Norbert Giczi and Sa ndor Imre EllipticCurve Cryptography Based Mutual AuthenticationProtocol for Low Computational Capacity RFIDSystems ? Performance ... L. Juniot and M.J.B. Robshaw, TheFeasibility of On-the-Tag Public Key Cryptography, ,Workshop on RFID Security, RFIDSec?07, 2007.Access on:http://rfidsec07.etsit.uma.es/slides/papers/paper-32.pdf[16] M. McLoone and ... 2007.[17] Axel Poschmann, Matt Robshaw, Frank Vater, andChristof Paar, Lightweight Cryptography and RFID:Tackling the Hidden Overheads, 7th InternationalConferenceInternational Conference on InformationSecurity ...
Result page:
1
2
3
4
5
6
7
8
9
10
>>