Search results: Found 10

Listing 1 - 10 of 10
Sort by
Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War

Authors: ---
ISBN: 9781925021073 Year: DOI: 10.26530/OAPEN_459995 Language: English
Publisher: ANU Press
Subject: History --- Science (General)
Added to DOAB on : 2014-01-13 12:33:57
License: ANU Press

Loading...
Export citation

Choose an application

Abstract

During the Second World War, Australia maintained a super-secret organisation, the Diplomatic (or `D’) Special Section, dedicated to breaking Japanese diplomatic codes. The Section has remained officially secret as successive Australian Governments have consistently refused to admit that Australia ever intercepted diplomatic communications, even in war-time. This book recounts the history of the Special Section and describes its code-breaking activities. It was a small but very select organisation, whose `technical’

Keywords

world war 2 --- cryptography

Real Life Cryptology

Author:
ISBN: 9789462985544 Year: DOI: 10.5117/9789462985544 Language: Undetermined
Publisher: Amsterdam University Press
Subject: Science (General)
Added to DOAB on : 2019-01-15 13:34:17
License:

Loading...
Export citation

Choose an application

Abstract

A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of “private” applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.

Partition-Based Trapdoor Ciphers

Authors: ---
ISBN: 9789535133865 9789535133858 Year: Pages: 92 DOI: 10.5772/intechopen.69485 Language: English
Publisher: IntechOpen
Subject: Media and communication
Added to DOAB on : 2019-10-03 07:51:50

Loading...
Export citation

Choose an application

Abstract

Block encryption algorithms are now the most widely used cipher systems in the world to protect our communications and our data. Despite the fact that their design is open and public, there is absolutely no guarantee that there do not exist hidden features, at the mathematical design level, that could enable an attacker to break those systems in an operational way. Such features are called backdoors or trapdoors. The present book intends to address the feasibility of a particular class of such backdoors based on partitionning the plaintext and ciphertext message spaces. Going from the theory to the practical aspects, it is shown that mathematical backdoors in encryption systems are possible. This book, thus, intends to initiate a new field of research.

Advanced Technologies of Quantum Key Distribution

Author:
ISBN: 9781789231960 9781789231977 Year: Pages: 212 DOI: 10.5772/65232 Language: English
Publisher: IntechOpen
Subject: Media and communication
Added to DOAB on : 2019-10-03 07:51:51

Loading...
Export citation

Choose an application

Abstract

This book explores both the state of the art and the latest developments in QKD. It describes the fundamental concepts and practical aspects of QKD from a viewpoint of information security and quantum channel efficiency improvement. The purpose of this book is to extend and update the knowledge of the readers in the dynamically changing field of QKD. The authors attempt to present in detail their results of scientific research, which is divided into two sections - Modern QKD Technologies and Quantum Channel Construction. It will be useful for researchers, engineers, graduates, and doctoral students working in quantum cryptography and information security-related areas.

Blockchain and Cryptocurrencies

Authors: ---
ISBN: 9781789239133 9781838812089 9781789239140 Year: Pages: 124 DOI: 10.5772/intechopen.74182 Language: English
Publisher: IntechOpen
Subject: Media and communication
Added to DOAB on : 2019-10-03 07:51:53

Loading...
Export citation

Choose an application

Abstract

Finance is the language of business and as technological disruption accelerates, a fundamental change is under way. This presents both opportunities and challenges for current-day organizations and finance professionals alike. Money makes the world go around, they say; but digital money not only makes the world go around, it does it in a decentralized fashion. Because the currencies are decentralized, with the right mix of technology the opportunities that emerge are noteworthy and emerge as a game changer for financial institutions. This book shows many different aspects, examples, and regulations of cryptocurrencies through its underpinning technology of blockchain in the present-day digital era. The diversity of the authors who sum up this book signify the importance of implementation in the digitized economy. It is divided into four main sections, with topics on Bitcoin, blockchain and digital returns, impact of cryptocurrencies in gaming, and cryptocurrency exchanges.

Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings

Authors: ---
Book Series: Security and Cryptology ISBN: 9783319897219 9783319897226 Year: Volume: 10804 Pages: 347 DOI: https://doi.org/10.1007/978-3-319-89722-6 Language: English
Publisher: Springer Grant: ETAPS e.V.
Subject: Computer Science
Added to DOAB on : 2018-06-29 14:49:22
License:

Loading...
Export citation

Choose an application

Abstract

This book constitutes the proceedings of the 7th International Conference on Principles of Security and Trust, POST 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The 13 papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections named: information flow and non-intereference; leakage, information flow, and protocols; smart contracts and privacy; firewalls and attack-defense trees.

Tools and Algorithms for the Construction and Analysis of Systems: 24th International Conference, TACAS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part I

Authors: ---
Book Series: Theoretical Computer Science and General Issues ISBN: 9783319899596 9783319899602 Year: Volume: 10805 Pages: 429 DOI: https://doi.org/10.1007/978-3-319-89960-2 Language: English
Publisher: Springer Grant: ETAPS e.V.
Subject: Computer Science
Added to DOAB on : 2018-07-19 14:22:46
License:

Loading...
Export citation

Choose an application

Abstract

The LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The total of 43 full and 11 short papers presented in these volumes was carefully reviewed and selected from 154submissions. The papers are organized in topical sections as follows:Part I: theorem proving; SAT and SMT I; deductive verification; software verification and optimization; model checking; and machine learning.Part II: concurrent and distributed systems; SAT and SMT II; security and reactive systems; static and dynamic program analysis; hybrid and stochastic systems; temporal logic and mu-calculus; 7th Competition on Software Verification – SV-COMP.

Side Channel Attacks

Author:
ISBN: 9783039210008 / 9783039210015 Year: Pages: 258 DOI: 10.3390/books978-3-03921-001-5 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Keywords

cache attack --- cache side-channel attack --- constant-time cryptographic algorithm --- rsa cryptosystem --- scatter-gather implementation --- modular exponentiation --- post-quantum cryptography --- lattice-based cryptography --- Gaussian sampling --- CDT sampling --- side-channel attack --- single trace analysis --- mobile ads --- software development kit (SDK), android package (APK), ad lib --- ad libraries --- ad networks --- graph --- graph similarity --- side-channel authentication --- leakage model --- AES --- FPGA --- unified point addition --- binary Huff curve --- recovery of secret exponent by triangular trace analysis --- horizontal collision correlation analysis --- side channel analysis --- single trace analysis --- post quantum cryptography --- NTRU --- side-channel analysis --- elliptic curve cryptography --- single-trace attack --- key bit-dependent attack --- countermeasure --- side channel analysis --- financial IC card --- first-order analysis --- second-order analysis --- data outsourcing --- integrity --- online authentication --- Merkle (hash) tree --- data loss --- information leakage --- reliability --- side-channel analysis --- power-analysis attack --- embedded system security --- machine-learning classification --- side-channel cache attacks --- cache misses --- AES --- cloud computing --- physically unclonable function --- chaos theory --- chaotic circuit --- FPGA --- CPLD --- challenge-response authentication --- hardware security --- side-channel attacks --- cryptographic keys --- side channel attack --- re-keying --- tweakable block cipher --- provable security --- n/a

Entropy in Image Analysis

Author:
ISBN: 9783039210923 / 9783039210930 Year: Pages: 456 DOI: 10.3390/books978-3-03921-093-0 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

Image analysis is a fundamental task for extracting information from images acquired across a range of different devices. Since reliable quantitative results are requested, image analysis requires highly sophisticated numerical and analytical methods—particularly for applications in medicine, security, and remote sensing, where the results of the processing may consist of vitally important data. The contributions to this book provide a good overview of the most important demands and solutions concerning this research area. In particular, the reader will find image analysis applied for feature extraction, encryption and decryption of data, color segmentation, and in the support new technologies. In all the contributions, entropy plays a pivotal role.

Keywords

image retrieval --- multi-feature fusion --- entropy --- relevance feedback --- chaotic system --- image encryption --- permutation-diffusion --- SHA-256 hash value --- dynamic index --- entropy --- keyframes --- Shannon’s entropy --- sign languages --- video summarization --- video skimming --- image encryption --- multiple-image encryption --- two-dimensional chaotic economic map --- security analysis --- image encryption --- chaotic cryptography --- cryptanalysis --- chosen-plaintext attack --- image information entropy --- blind image quality assessment (BIQA) --- information entropy, natural scene statistics (NSS) --- Weibull statistics --- discrete cosine transform (DCT) --- ultrasound --- hepatic steatosis --- Shannon entropy --- fatty liver --- metabolic syndrome --- multi-exposure image fusion --- texture information entropy --- adaptive selection --- patch structure decomposition --- image encryption --- time-delay --- random insertion --- information entropy --- chaotic map --- uncertainty assessment --- deep neural network --- random forest --- Shannon entropy --- positron emission tomography --- reconstruction --- field of experts --- additive manufacturing --- 3D prints --- 3D scanning --- image entropy --- depth maps --- surface quality assessment --- machine vision --- image analysis --- Arimoto entropy --- free-form deformations --- normalized divergence measure --- gradient distributions --- nonextensive entropy --- non-rigid registration --- pavement --- macrotexture --- 3-D digital imaging --- entropy --- decay trend --- discrete entropy --- infrared images --- low contrast --- multiscale top-hat transform --- image encryption --- DNA encoding --- chaotic cryptography --- cryptanalysis --- image privacy --- computer aided diagnostics --- colonoscopy --- Rényi entropies --- structural entropy --- spatial filling factor --- binary image --- Cantor set --- Hénon map --- Minkowski island --- prime-indexed primes --- Ramanujan primes --- Kapur’s entropy --- color image segmentation --- whale optimization algorithm --- differential evolution --- hybrid algorithm --- Otsu method --- image encryption --- dynamic filtering --- DNA computing --- 3D Latin cube --- permutation --- diffusion --- fuzzy entropy --- electromagnetic field optimization --- chaotic strategy --- color image segmentation --- multilevel thresholding --- contrast enhancement --- sigmoid --- Tsallis statistics --- q-exponential --- q-sigmoid --- q-Gaussian --- ultra-sound images --- person re-identification --- image analysis --- hash layer --- quantization loss --- Hamming distance --- cross-entropy loss --- image entropy --- Shannon entropy --- generalized entropies --- image processing --- image segmentation --- medical imaging --- remote sensing --- security

Integral Transforms and Operational Calculus

Author:
ISBN: 9783039216185 / 9783039216192 Year: Pages: 510 DOI: 10.3390/books978-3-03921-619-2 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-12-09 11:49:16
License:

Loading...
Export citation

Choose an application

Abstract

Researches and investigations involving the theory and applications of integral transforms and operational calculus are remarkably wide-spread in many diverse areas of the mathematical, physical, chemical, engineering and statistical sciences.

Keywords

highly oscillatory --- convolution quadrature rule --- volterra integral equation --- Bessel kernel --- convergence --- higher order Schwarzian derivatives --- Janowski star-like function --- Janowski convex function --- bound on derivatives --- tangent numbers --- tangent polynomials --- Carlitz-type q-tangent numbers --- Carlitz-type q-tangent polynomials --- (p,q)-analogue of tangent numbers and polynomials --- (p,q)-analogue of tangent zeta function --- symmetric identities --- zeros --- Lommel functions --- univalent functions --- starlike functions --- convex functions --- inclusion relationships --- analytic function --- Hankel determinant --- exponential function --- upper bound --- nonlinear boundary value problems --- fractional-order differential equations --- Riemann-Stieltjes functional integral --- Liouville-Caputo fractional derivative --- infinite-point boundary conditions --- advanced and deviated arguments --- existence of at least one solution --- Fredholm integral equation --- Schauder fixed point theorem --- Hölder condition --- generalized Kuramoto–Sivashinsky equation --- modified Kudryashov method --- exact solutions --- Maple graphs --- analytic function --- Hadamard product (convolution) --- partial sum --- Srivastava–Tomovski generalization of Mittag–Leffler function --- subordination --- differential equation --- differential inclusion --- Liouville–Caputo-type fractional derivative --- fractional integral --- existence --- fixed point --- Bernoulli spiral --- Grandi curves --- Chebyshev polynomials --- pseudo-Chebyshev polynomials --- orthogonality property --- symmetric --- encryption --- password --- hash --- cryptography --- PBKDF --- q–Bleimann–Butzer–Hahn operators --- (p,q)-integers --- (p,q)-Bernstein operators --- (p,q)-Bleimann–Butzer–Hahn operators --- modulus of continuity --- rate of approximation --- K-functional --- Hurwitz-Lerch zeta function --- generalized functions --- analytic number theory --- ?-generalized Hurwitz-Lerch zeta functions --- derivative properties --- series representation --- basic hypergeometric functions --- generating functions --- q-polynomials --- analytic functions --- Mittag–Leffler functions --- starlike functions --- convex functions --- Hardy space --- vibrating string equation --- initial conditions --- spectral decomposition --- regular solution --- the uniqueness of the solution --- the existence of a solution --- analytic --- ?-convex function --- starlike function --- strongly-starlike function --- subordination --- q -Sheffer–Appell polynomials --- generating relations --- determinant definition --- recurrence relation --- q -Hermite–Bernoulli polynomials --- q -Hermite–Euler polynomials --- q -Hermite–Genocchi polynomials --- Volterra integral equations --- highly oscillatory Bessel kernel --- Hermite interpolation --- direct Hermite collocation method --- piecewise Hermite collocation method --- differential operator --- q-hypergeometric functions --- meromorphic function --- Mittag–Leffler function --- Hadamard product --- differential subordination --- starlike functions --- Bell numbers --- radius estimate --- (p, q)-integers --- Dunkl analogue --- generating functions --- generalization of exponential function --- Szász operator --- modulus of continuity --- function spaces and their duals --- distributions --- tempered distributions --- Schwartz testing function space --- generalized functions --- distribution space --- wavelet transform of generalized functions --- Fourier transform --- analytic function --- subordination --- Dziok–Srivastava operator --- nonlinear boundary value problem --- nonlocal --- multi-point --- multi-strip --- existence --- Ulam stability --- functions of bounded boundary and bounded radius rotations --- subordination --- functions with positive real part --- uniformly starlike and convex functions --- analytic functions --- univalent functions --- starlike and q-starlike functions --- q-derivative (or q-difference) operator --- sufficient conditions --- distortion theorems --- Janowski functions --- analytic number theory --- ?-generalized Hurwitz–Lerch zeta functions --- derivative properties --- recurrence relations --- integral representations --- Mellin transform --- natural transform --- Adomian decomposition method --- Caputo fractional derivative --- generalized mittag-leffler function --- analytic functions --- Hadamard product --- starlike functions --- q-derivative (or q-difference) operator --- Hankel determinant --- q-starlike functions --- fuzzy volterra integro-differential equations --- fuzzy general linear method --- fuzzy differential equations --- generalized Hukuhara differentiability --- spectrum symmetry --- DCT --- MFCC --- audio features --- anuran calls --- analytic functions --- convex functions --- starlike functions --- strongly convex functions --- strongly starlike functions --- uniformly convex functions --- Struve functions --- truncated-exponential polynomials --- monomiality principle --- generating functions --- Apostol-type polynomials and Apostol-type numbers --- Bernoulli, Euler and Genocchi polynomials --- Bernoulli, Euler, and Genocchi numbers --- operational methods --- summation formulas --- symmetric identities --- Euler numbers and polynomials --- q-Euler numbers and polynomials --- Hurwitz-Euler eta function --- multiple Hurwitz-Euler eta function --- higher order q-Euler numbers and polynomials --- (p, q)-Euler numbers and polynomials of higher order --- symmetric identities --- symmetry of the zero

Listing 1 - 10 of 10
Sort by