Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for January 2013

Total of 48 entries : 1-25 26-48
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1301.0313 [pdf, other]
Title: The Piggy Bank Cryptographic Trope
Subhash Kak
Comments: 7 pages, 6 figures
Journal-ref: Infocommunications Journal 6: 22-25 (2014)
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:1301.0315 [pdf, other]
Title: Increasing Security in Cloud Environment
Priyanka Naik, Sugata Sanyal
Comments: 8 pages, 1 table
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1301.1026 [pdf, other]
Title: On the complexity of the Rank Syndrome Decoding problem
Philippe Gaborit, Olivier Ruatta, Julien Schrek
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1301.1195 [pdf, other]
Title: Tropical cryptography
Dima Grigoriev, Vladimir Shpilrain
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[5] arXiv:1301.1262 [pdf, other]
Title: Protecting Online Documents from an Unauthorized External Access (in Bulgarian)
Yordan Kalmukov
Comments: in Bulgarian
Journal-ref: Conference Proceedings of "Days of Science 2011", Volume 2, pp. 442-451, Veliko Tarnovo, Bulgaria, 2011, ISSN: 1314-2283
Subjects: Cryptography and Security (cs.CR); Digital Libraries (cs.DL)
[6] arXiv:1301.1275 [pdf, other]
Title: My Software has a Vulnerability, should I worry?
Luca Allodi, Fabio Massacci
Comments: 12 pages, 4 figures
Journal-ref: ACM TISSEC Vol 17 Issue 1, 2014
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1301.1578 [pdf, other]
Title: The risk assessment and treatment approach in order to provide lan security based on isms standard
Marzieh Sameni Toosarvandani, Nasser Modiri, Mahdi Afzali
Comments: 20 pages, 2 figures, 5 tables, International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 2, No.6, November 2012
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1301.1739 [pdf, other]
Title: Driving an NP-Complete problem with Combinatorial Decomposition to generate a unique and irreversible bitstring from a single integer seed value
S. P. Christmas, R. M. Leidich
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1301.1746 [pdf, other]
Title: Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks
Yulong Shen, Xiaohong Jiang, Jianfeng Ma
Comments: 15 pages, 2 figures. arXiv admin note: substantial text overlap with arXiv:1212.0287, arXiv:1212.6627, arXiv:1211.7075
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
[10] arXiv:1301.1912 [pdf, other]
Title: Cloud Penetration Testing
Ralph LaBarge, Thomas McGuire
Comments: 20 pages, 16 figures; International Journal on Cloud Computing: Services and Architecture (IJCCSA),Vol.2, No.6, December 2012
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[11] arXiv:1301.2010 [pdf, other]
Title: Authentication Schemes Using Polynomials Over Non-Commutative Rings
Maheswara Rao Valluri (School of Mathematical and Computing Sciences, Fiji National University, Derrick Campus, Suva, Fiji)
Comments: International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.4, December 2012
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[12] arXiv:1301.2335 [pdf, other]
Title: New digital signature protocol based on elliptic curves
Ounasser Abid, Jaouad Ettanfouhi, Omar Khadir
Journal-ref: International Journal on Cryptography and Information Security (2012)
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[13] arXiv:1301.2907 [pdf, other]
Title: Conditions on the generator for forging ElGamal signature
Omar Khadir
Journal-ref: International Journal of Pure and Applied mathematics, (2011), Vol.70, No 7, pp.939-949
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[14] arXiv:1301.3258 [pdf, other]
Title: New variant of ElGamal signature scheme
Omar Khadir
Journal-ref: Int. Contemp. Math. Sciences, Vol. 5, 2010, no 34, pp.1653-1662
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[15] arXiv:1301.3632 [pdf, other]
Title: SkyDe: a Skype-based Steganographic Method
Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski
Comments: 7 pages, 6 figures, 1 table. The paper is submitted to 1st ACM Information Hiding and Multimedia Security Workshop (IH and ACM MMSec conferences merged into a single event), June 17-19, 2013, Montpellier, France
Journal-ref: International Journal of Computers, Communications & Control (IJCCC), ISSN: 1841- 9836, 8(3), June 2013, pp. 389-400
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[16] arXiv:1301.4089 [pdf, other]
Title: Cryptanalyzing image encryption using chaotic logistic map
Chengqing Li, Tao Xie, Qi Liu, Ge Cheng
Comments: 6 pages
Journal-ref: Nonlinear Dynamics, 78(2):1545-1551, 2014
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:1301.4289 [pdf, other]
Title: A geometric protocol for cryptography with cards
Andrés Cordón-Franco, Hans van Ditmarsch, David Fernández-Duque, Fernando Soler-Toscano
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[18] arXiv:1301.4723 [pdf, other]
Title: Practical Bijective S-box Design
Abdurashid Mamadolimov, Herman Isa, Moesfa Soeheila Mohamad
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO)
[19] arXiv:1301.5022 [pdf, other]
Title: A formalization of re-identification in terms of compatible probabilities
Vicenç Torra, Klara Stokes
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Information Theory (cs.IT)
[20] arXiv:1301.5065 [pdf, other]
Title: Security in Wireless Sensor Networks
Jaydip Sen
Comments: 51 pages. 5 Figures and 7 Tables. Book Chapter in the book "Wireless Sensor Networks: Current Status and Future Trends", A.S.K. Pathan et al. (eds.), CRC Press USA, November 2012; This book chapter is an extended version of author's earlier arXiv submission: arXiv:1011.1529 and also has substantial text overlap with arXiv:1101.2759
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[21] arXiv:1301.5069 [pdf, other]
Title: Secrecy without one-way functions
Dima Grigoriev, Vladimir Shpilrain
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[22] arXiv:1301.5091 [pdf, other]
Title: Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols
Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin, Wenmin Li
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1301.5136 [pdf, other]
Title: Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper
Mohsen Bahrami, Ali Bereyhi, Mahtab Mirmohseni, Mohammad Reza Aref
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:1301.5142 [pdf, other]
Title: Key agreement over a 3-receiver broadcast channel
Mohsen Bahrami, Ali Bereyhi, Sadaf Salehkalaibar, Mohammad Reza Aref
Comments: Accepted in IWCIT 2013
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1301.6176 [pdf, other]
Title: Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search
Thijs Laarhoven, Michele Mosca, Joop van de Pol
Comments: 19 pages
Journal-ref: 5th International Workshop on Post-Quantum Cryptography (PQCrypto), pp. 83-101, 2013
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
Total of 48 entries : 1-25 26-48
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack