[图书][B] Encyclopedia of cryptography and security

HCA Van Tilborg, S Jajodia - 2014 - books.google.com
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography
and Security brings the latest and most comprehensive coverage of the topic: Definitive …

Relating undisturbed bits to other properties of substitution boxes

RH Makarim, C Tezcan - … workshop on lightweight cryptography for security …, 2014 - Springer
Recently it was observed that for a particular nonzero input difference to an S-Box, some bits
in all the corresponding output differences may remain invariant. These specific invariant …

Printed document integrity verification using barcode

A Husain, M Bakhtiari, A Zainal - Jurnal Teknologi, 2014 - journals.utm.my
Printed documents are still relevant in our daily life and information in it must be protected
from threats and attacks such as forgery, falsification or unauthorized modification. Such …

Automatic design of noncryptographic hash functions using genetic programming

C Estébanez, Y Saez, G Recio… - Computational …, 2014 - Wiley Online Library
Noncryptographic hash functions have an immense number of important practical
applications owing to their powerful search properties. However, those properties critically …

A panorama of post-quantum cryptography

PSLM Barreto, F Piazza Biasi, R Dahab… - Open Problems in …, 2014 - Springer
Abstract In 1994, Peter Shor published a quantum algorithm capable of factoring large
integers and computing discrete logarithms in Abelian groups in polynomial time. Since …

A digital watermarking framework with application to medical image security

HMDA Nyeem - 2014 - eprints.qut.edu.au
Dealing with digital medical images is raising many new security problems with legal and
ethical complexities for local archiving and distant medical services. These include image …

A Construction of Bent Functions of n + 2 Variables from a Bent Function of n Variables and Its Cyclic Shifts

JJ Climent, FJ García, V Requena - Algebra, 2014 - Wiley Online Library
We present a method to iteratively construct new bent functions of n+ 2 variables from a bent
function of n variables and its cyclic shift permutations using minterms of n variables and …

Cryptanalysis of double-block-length hash modes MDC-4 and MJH

D Hong, D Kwon - IEICE Transactions on Fundamentals of …, 2014 - search.ieice.org
We give some attacks on the DBL hash modes MDC-4 and MJH. Our preimage attack on the
MDC-4 hash function requires the time complexity O (2 3n/2) for the block length n of the …

Affine Equivalency and Nonlinearity Preserving Bijective Mappings over

İ Sertkaya, A Doğanaksoy, O Uzunkol… - International Workshop on …, 2014 - Springer
We first give a proof of an isomorphism between the group of affine equivalent maps and the
automorphism group of Sylvester Hada-mard matrices. Secondly, we prove the existence of …

Threats to Bitcoin Software

CH Kateraas - 2014 - ntnuopen.ntnu.no
Collect and analyse threat models to the Bitcoin ecosystem and its software. The create
misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client …