Search
Now showing items 1-10 of 66
On some connections between statistics and cryptology
Cardiac fiber tracking using particle filtering in MRI
A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems
Telecare medical information systems are becoming more and more popular due to the provision of delivering health services including remote access to health profile for doctors, staff and patients. Since these systems are ...
Analysis of a Kalman filter detector for atomic clock anomalies
A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol
Session Initiation Protocol (SIP) is known as multimedia communication protocol based on IP, which is leveraged to provide signalling as well as instant messaging services. Since SIP services are widely used by Internet ...
A Differential Boomerang Attack Against 7-round Rijndael
In this paper, we report on our design of a choosen plaintext attack with work factor 2252 to recover of the first and the last subkeys of a 7-round Rijndael, while differential cryptanalysis against Rijndael have been done for up to 6 rounds...
Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
With the advent of the internet, Voice over Internet Protocol (VoIP) has obtained a
considerable amount of attention due to its low cost, and ease of implementation.
Similar to other emerging technologies, VoIP faces ...
FINDING HIGHLY PROBABLE DIFFERENTIAL CHARACTERISTICS OF SUBSTITUTION-PERMUTATION NETWORKS USING GENETIC ALGORITHMS
In this paper, we propose a genetic algorithm, called GenSPN,
for finding highly probable differential characteristics of substitutionpermutation
networks (SPNs). A special fitness function and a heuristic< ...