[[abstract]]n this thesis, a randomly dynamic cryptosystem is proposed. The processes are composed of two major parts. The first is a process of encoding and the other is encrypting. The process of encoding can be applied alone, without encrypting process. Originally, there is a codebook, called original codebook. The original codebook is transformed with homogeneous transformations into some business codebooks, each one is different from the others. Each business has one such unique business codebook. A business has many users. Each user has one unique codebook which is again transformed from the business codebook with a homogeneous transformation, which is called fixed codebook. Once a custom wants to make a plaintext into a ciphertext, ...
The notion of randomized encoding allows to represent a “complex ” function f(x) by a “simpler ” ran...
Cryptography refers to protecting transmitted information from unauthorized interception or tamperin...
This work, introduces a method to repair a cryptosystem based on a chaotic dynamical system. Baptis...
SummaryThere are many cryptographic systems that use complex operations involving substitutions and ...
[[abstract]]Encryption is a treatment for hiding a piece of information via a specific method in ord...
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and...
Abstract: In a symmetric-key cryptosystem, where the secret key is known to both the sender who encr...
The ability to produce random numbers is an important aspect of many cryptographic applications. Thi...
Although many encryption methods are available, there is always an ongoing need for more to resist t...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
This article evaluates the innovation landscape facing the challenge of generating fresh shared rand...
[[abstract]]The so-called Intelligence Living Space is an ongoing issue without well definition, and...
In our increasingly connected and open World, randomness has become an endangered species. We may so...
Abstract. Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving...
Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the...
The notion of randomized encoding allows to represent a “complex ” function f(x) by a “simpler ” ran...
Cryptography refers to protecting transmitted information from unauthorized interception or tamperin...
This work, introduces a method to repair a cryptosystem based on a chaotic dynamical system. Baptis...
SummaryThere are many cryptographic systems that use complex operations involving substitutions and ...
[[abstract]]Encryption is a treatment for hiding a piece of information via a specific method in ord...
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and...
Abstract: In a symmetric-key cryptosystem, where the secret key is known to both the sender who encr...
The ability to produce random numbers is an important aspect of many cryptographic applications. Thi...
Although many encryption methods are available, there is always an ongoing need for more to resist t...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
This article evaluates the innovation landscape facing the challenge of generating fresh shared rand...
[[abstract]]The so-called Intelligence Living Space is an ongoing issue without well definition, and...
In our increasingly connected and open World, randomness has become an endangered species. We may so...
Abstract. Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving...
Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the...
The notion of randomized encoding allows to represent a “complex ” function f(x) by a “simpler ” ran...
Cryptography refers to protecting transmitted information from unauthorized interception or tamperin...
This work, introduces a method to repair a cryptosystem based on a chaotic dynamical system. Baptis...