Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Animesh Chhotaray"'
Autor:
Animesh Chhotaray, Thomas Shrimpton
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Autor:
Washington Garcia, Animesh Chhotaray, Somesh Jha, Joseph I. Choi, Suman Kalyan Adari, Kevin R. B. Butler
Publikováno v:
CODASPY
Authenticating a networked device relies on identifying its unique characteristics. Recent device fingerprinting proposals demonstrate that device activity, such as network traffic, can be used to extract features which identify devices using machine
Publikováno v:
CCS
We provide an analysis of IEEE standard P1735, which describes methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP. We find a surprising number of cryptographic mistakes in the s
Publikováno v:
Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics ISBN: 9788132225287
Many image encryption techniques have been designed based on block based transformation techniques or chaos based algorithms. In this paper, a two stage image encryption technique is proposed. In the first stage, a new method of generating orthonorma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::77b557a902fea27507d68237b156a925
https://doi.org/10.1007/978-81-322-2529-4_37
https://doi.org/10.1007/978-81-322-2529-4_37
Publikováno v:
2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN).
It is very difficult to find the inverse of a matrix in Galois field using standard matrix inversion algorithms. Hence, any block-based encryption process involving matrix as a key will take considerable amount of time for decryption. The inverse of
Publikováno v:
2014 International Conference on Devices, Circuits and Communications (ICDCCom).
Standard matrix inversion algorithms take substantial amount of time to find the inverse of a large matrix. Therefore, large matrices can be used as public keys in asymmetric key cryptosystems. But the decryption algorithm of such a cryptosystem has