Kim, Pyung Lee, Younho Hong, Youn-Sik Kwon, Taekyoung
Published in
Sensors (Basel, Switzerland)
To meet password selection criteria of a server, a user occasionally needs to provide multiple choices of password candidates to an on-line password meter, but such user-chosen candidates tend to be derived from the user's previous passwords-the meter may have a high chance to acquire information about a user's passwords employed for various purpos...
Akishin, Aleksandr V.
Published in
Discrete Mathematics and Applications
We consider polynomials over rings such that the polynomials represent Latin squares and define a group operation over the ring. We introduce the notion of a group polynomial, describe a number of properties of these polynomials and the groups generated. For the case of residue rings ℤ r n , $\mathbb{Z}_{r^n},$where r is a prime number, we give a d...
Jung, Chunghwan Yang, Younghwan Jang, Jaehyuck Badloe, Trevon Lee, Taejun Mun, Jungho Moon, Seong-Won Rho, Junsuk
Published in
Nanophotonics
Structural coloration using metasurfaces has been steadily researched to overcome the limitations of conventional color printing using pigments by improving the resolution, lowering the toxicity, and increasing the durability. Many metasurfaces have been demonstrated for dynamic structural coloration to convert images at the visible spectrum. Howev...
To, Seu Man (author)
The adoption of smart wearable devices has been on the rise over the past few years. These wearables are able to track the user's vital signs, making them valuable for use in the healthcare industry. Sharing this information with the user's healthcare provider has the potential to improve medical care by reducing medical misinformation. Currently, ...
Chen, Haixia Huang, Xinyi Wu, Wei Mu, Yi
Published in
Science China Information Sciences
Image authentication is the technology of verifying image origin, integrity and authenticity. A rich stream of research on image authentication has shown various trade-off among four favorable features, namely robustness, security, versatility and efficiency. Image data authentication has the highest level of security but provides no robustness/ver...
Lima Pereira, Hilder Vitor
Cryptographic schemes are constructed on top of problems that are believed to be hard. In particular, recent advanced schemes, as homomorphic primitives and obfuscators, use the approximate greatest common divisor (AGCD) problem, which is simple to describe and easy to implement, since it does not require complex algebraic structures nor hard-to-sa...
Voršnik, Matej
Tehnologija veriženja blokov v zadnjih letih vse od vzpona popularnosti kriptovalute Bitcoin postaja ena izmed bolj perečih tem varnostne skupnosti. Veliko držav po svetu (med njimi je tudi Republika Slovenija) v tehnologiji veriženja blokov vidi priložnost za izboljšanje javnih storitev in optimizacijo tako javnega kot zasebnega življenja ljudi. T...
Lu, Xiang-Jun Zhang, Chi Gu, Da-Wu Liu, Jun-Rong Peng, Qian Zhang, Hai-Feng
Published in
Journal of Computer Science and Technology
Side-channel attacks (SCAs) play an important role in the security evaluation of cryptographic devices. As a form of SCAs, profiled differential power analysis (DPA) is among the most powerful and efficient by taking advantage of a profiling phase that learns features from a controlled device. Linear regression (LR) based profiling, a special profi...
BRECELJ, BOR
V nekaterih situacijah ni zaželjeno, da lahko kdorkoli preveri veljavnost digitalnega podpisa. Podpisi brez možnosti zanikanja to dosežejo tako, da mora pri preverjanju podpisa sodelovati tudi podpisnik. Za preverjanje podpisa potrebujemo potrditveni protokol, s katerim dokažemo veljavnost našega podpisa, in zavrnitveni protokol, s katerim lahko do...
GORJAN, ANDREJ
Eden od temeljev kriptografije je teorija števil. Kot osnovni gradniki imajo v njej osrednji pomen praštevila in se posledično uporabljajo v mnogih šifrirnih algoritmih. To seveda pomeni, da morajo ti algoritmi imeti dostop do naključnih praštevil. Pri izbiri moramo biti pazljivi, saj nam kitajski izrek o ostankih pri določenih praštevilih omogoča ...