Search results: Found 9

Listing 1 - 9 of 9
Sort by
Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War

Authors: ---
ISBN: 9781925021073 Year: DOI: 10.26530/OAPEN_459995 Language: English
Publisher: ANU Press
Subject: History --- Science (General)
Added to DOAB on : 2014-01-13 12:33:57
License: ANU Press

Loading...
Export citation

Choose an application

Abstract

During the Second World War, Australia maintained a super-secret organisation, the Diplomatic (or `D’) Special Section, dedicated to breaking Japanese diplomatic codes. The Section has remained officially secret as successive Australian Governments have consistently refused to admit that Australia ever intercepted diplomatic communications, even in war-time. This book recounts the history of the Special Section and describes its code-breaking activities. It was a small but very select organisation, whose `technical’

Keywords

world war 2 --- cryptography

Real Life Cryptology

Author:
ISBN: 9789462985544 Year: DOI: 10.5117/9789462985544 Language: Undetermined
Publisher: Amsterdam University Press
Subject: Science (General)
Added to DOAB on : 2019-01-15 13:34:17
License:

Loading...
Export citation

Choose an application

Abstract

A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of “private” applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.

Partition-Based Trapdoor Ciphers

Authors: ---
ISBN: 9789535133865 9789535133858 Year: Pages: 92 DOI: 10.5772/intechopen.69485 Language: English
Publisher: IntechOpen
Subject: Media and communication
Added to DOAB on : 2019-10-03 07:51:50

Loading...
Export citation

Choose an application

Abstract

Block encryption algorithms are now the most widely used cipher systems in the world to protect our communications and our data. Despite the fact that their design is open and public, there is absolutely no guarantee that there do not exist hidden features, at the mathematical design level, that could enable an attacker to break those systems in an operational way. Such features are called backdoors or trapdoors. The present book intends to address the feasibility of a particular class of such backdoors based on partitionning the plaintext and ciphertext message spaces. Going from the theory to the practical aspects, it is shown that mathematical backdoors in encryption systems are possible. This book, thus, intends to initiate a new field of research.

Advanced Technologies of Quantum Key Distribution

Author:
ISBN: 9781789231960 9781789231977 Year: Pages: 212 DOI: 10.5772/65232 Language: English
Publisher: IntechOpen
Subject: Media and communication
Added to DOAB on : 2019-10-03 07:51:51

Loading...
Export citation

Choose an application

Abstract

This book explores both the state of the art and the latest developments in QKD. It describes the fundamental concepts and practical aspects of QKD from a viewpoint of information security and quantum channel efficiency improvement. The purpose of this book is to extend and update the knowledge of the readers in the dynamically changing field of QKD. The authors attempt to present in detail their results of scientific research, which is divided into two sections - Modern QKD Technologies and Quantum Channel Construction. It will be useful for researchers, engineers, graduates, and doctoral students working in quantum cryptography and information security-related areas.

Blockchain and Cryptocurrencies

Authors: ---
ISBN: 9781789239133 9781838812089 9781789239140 Year: Pages: 124 DOI: 10.5772/intechopen.74182 Language: English
Publisher: IntechOpen
Subject: Media and communication
Added to DOAB on : 2019-10-03 07:51:53

Loading...
Export citation

Choose an application

Abstract

Finance is the language of business and as technological disruption accelerates, a fundamental change is under way. This presents both opportunities and challenges for current-day organizations and finance professionals alike. Money makes the world go around, they say; but digital money not only makes the world go around, it does it in a decentralized fashion. Because the currencies are decentralized, with the right mix of technology the opportunities that emerge are noteworthy and emerge as a game changer for financial institutions. This book shows many different aspects, examples, and regulations of cryptocurrencies through its underpinning technology of blockchain in the present-day digital era. The diversity of the authors who sum up this book signify the importance of implementation in the digitized economy. It is divided into four main sections, with topics on Bitcoin, blockchain and digital returns, impact of cryptocurrencies in gaming, and cryptocurrency exchanges.

Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings

Authors: ---
Book Series: Security and Cryptology ISBN: 9783319897219 9783319897226 Year: Volume: 10804 Pages: 347 DOI: https://doi.org/10.1007/978-3-319-89722-6 Language: English
Publisher: Springer Grant: ETAPS e.V.
Subject: Computer Science
Added to DOAB on : 2018-06-29 14:49:22
License:

Loading...
Export citation

Choose an application

Abstract

This book constitutes the proceedings of the 7th International Conference on Principles of Security and Trust, POST 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The 13 papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections named: information flow and non-intereference; leakage, information flow, and protocols; smart contracts and privacy; firewalls and attack-defense trees.

Tools and Algorithms for the Construction and Analysis of Systems: 24th International Conference, TACAS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part I

Authors: ---
Book Series: Theoretical Computer Science and General Issues ISBN: 9783319899596 9783319899602 Year: Volume: 10805 Pages: 429 DOI: https://doi.org/10.1007/978-3-319-89960-2 Language: English
Publisher: Springer Grant: ETAPS e.V.
Subject: Computer Science
Added to DOAB on : 2018-07-19 14:22:46
License:

Loading...
Export citation

Choose an application

Abstract

The LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The total of 43 full and 11 short papers presented in these volumes was carefully reviewed and selected from 154submissions. The papers are organized in topical sections as follows:Part I: theorem proving; SAT and SMT I; deductive verification; software verification and optimization; model checking; and machine learning.Part II: concurrent and distributed systems; SAT and SMT II; security and reactive systems; static and dynamic program analysis; hybrid and stochastic systems; temporal logic and mu-calculus; 7th Competition on Software Verification – SV-COMP.

Side Channel Attacks

Author:
ISBN: 9783039210008 / 9783039210015 Year: Pages: 258 DOI: 10.3390/books978-3-03921-001-5 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Keywords

cache attack --- cache side-channel attack --- constant-time cryptographic algorithm --- rsa cryptosystem --- scatter-gather implementation --- modular exponentiation --- post-quantum cryptography --- lattice-based cryptography --- Gaussian sampling --- CDT sampling --- side-channel attack --- single trace analysis --- mobile ads --- software development kit (SDK), android package (APK), ad lib --- ad libraries --- ad networks --- graph --- graph similarity --- side-channel authentication --- leakage model --- AES --- FPGA --- unified point addition --- binary Huff curve --- recovery of secret exponent by triangular trace analysis --- horizontal collision correlation analysis --- side channel analysis --- single trace analysis --- post quantum cryptography --- NTRU --- side-channel analysis --- elliptic curve cryptography --- single-trace attack --- key bit-dependent attack --- countermeasure --- side channel analysis --- financial IC card --- first-order analysis --- second-order analysis --- data outsourcing --- integrity --- online authentication --- Merkle (hash) tree --- data loss --- information leakage --- reliability --- side-channel analysis --- power-analysis attack --- embedded system security --- machine-learning classification --- side-channel cache attacks --- cache misses --- AES --- cloud computing --- physically unclonable function --- chaos theory --- chaotic circuit --- FPGA --- CPLD --- challenge-response authentication --- hardware security --- side-channel attacks --- cryptographic keys --- side channel attack --- re-keying --- tweakable block cipher --- provable security --- n/a

Entropy in Image Analysis

Author:
ISBN: 9783039210923 / 9783039210930 Year: Pages: 456 DOI: 10.3390/books978-3-03921-093-0 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

Image analysis is a fundamental task for extracting information from images acquired across a range of different devices. Since reliable quantitative results are requested, image analysis requires highly sophisticated numerical and analytical methods—particularly for applications in medicine, security, and remote sensing, where the results of the processing may consist of vitally important data. The contributions to this book provide a good overview of the most important demands and solutions concerning this research area. In particular, the reader will find image analysis applied for feature extraction, encryption and decryption of data, color segmentation, and in the support new technologies. In all the contributions, entropy plays a pivotal role.

Keywords

image retrieval --- multi-feature fusion --- entropy --- relevance feedback --- chaotic system --- image encryption --- permutation-diffusion --- SHA-256 hash value --- dynamic index --- entropy --- keyframes --- Shannon’s entropy --- sign languages --- video summarization --- video skimming --- image encryption --- multiple-image encryption --- two-dimensional chaotic economic map --- security analysis --- image encryption --- chaotic cryptography --- cryptanalysis --- chosen-plaintext attack --- image information entropy --- blind image quality assessment (BIQA) --- information entropy, natural scene statistics (NSS) --- Weibull statistics --- discrete cosine transform (DCT) --- ultrasound --- hepatic steatosis --- Shannon entropy --- fatty liver --- metabolic syndrome --- multi-exposure image fusion --- texture information entropy --- adaptive selection --- patch structure decomposition --- image encryption --- time-delay --- random insertion --- information entropy --- chaotic map --- uncertainty assessment --- deep neural network --- random forest --- Shannon entropy --- positron emission tomography --- reconstruction --- field of experts --- additive manufacturing --- 3D prints --- 3D scanning --- image entropy --- depth maps --- surface quality assessment --- machine vision --- image analysis --- Arimoto entropy --- free-form deformations --- normalized divergence measure --- gradient distributions --- nonextensive entropy --- non-rigid registration --- pavement --- macrotexture --- 3-D digital imaging --- entropy --- decay trend --- discrete entropy --- infrared images --- low contrast --- multiscale top-hat transform --- image encryption --- DNA encoding --- chaotic cryptography --- cryptanalysis --- image privacy --- computer aided diagnostics --- colonoscopy --- Rényi entropies --- structural entropy --- spatial filling factor --- binary image --- Cantor set --- Hénon map --- Minkowski island --- prime-indexed primes --- Ramanujan primes --- Kapur’s entropy --- color image segmentation --- whale optimization algorithm --- differential evolution --- hybrid algorithm --- Otsu method --- image encryption --- dynamic filtering --- DNA computing --- 3D Latin cube --- permutation --- diffusion --- fuzzy entropy --- electromagnetic field optimization --- chaotic strategy --- color image segmentation --- multilevel thresholding --- contrast enhancement --- sigmoid --- Tsallis statistics --- q-exponential --- q-sigmoid --- q-Gaussian --- ultra-sound images --- person re-identification --- image analysis --- hash layer --- quantization loss --- Hamming distance --- cross-entropy loss --- image entropy --- Shannon entropy --- generalized entropies --- image processing --- image segmentation --- medical imaging --- remote sensing --- security

Listing 1 - 9 of 9
Sort by