Cryptographic Protocols
472 Followers
Recent papers in Cryptographic Protocols
Abstract—The current proliferation of mobile devices has resulted in a large diversity of hardware specifications, each designed for different services and applications (e.g. cell phones, smart phones, PDAs). At the same time, e-mail... more
Summary form only given. It is well known that despite all of its advantages the digital revolution also leads to large variety of new risks. One principal issue in this context is the growing dependence of our modern information society... more
We report a quantum interference of nondiffracting beams by using photon pairs generated by spontaneous parametric down-conversion. The photon pairs transmitted by two double annular aperture produce fourth-order interference pattern... more
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography andInformation security. It aims to bring together scientists,... more
11th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in practice, it still serves an important pedagogical role in... more
All Classical cryptographic methods used in our life based on mathematical ideas & computational assumption are actually unsafe, so quantum cryptography is proposed nowadays Quantum key distribution (QKD) promises secure key agreement by... more
Quantum key distribution is a technique that permits the secure distribution of a bit string that is used as key in cryptographic protocols. The security is guaranteed by suitable coding of the information in a quantum property and from... more
Internet-enabled wireless devices continue to proliferate and are expected to surpass tradition-al Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data secu-rity... more
In the development of 3G devices, all element of multimedia (text image audio and video) are used. To use this information, a channel of high bandwidth and more secured system is required. In this era, network security has become an issue... more
11 th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The short message service (SMS) is one of its superior and well-tried services with a global availability in the GSM networks. The... more
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. To enable a mashup to gather data from legacy applications and... more
11thInternational Conference on Cryptography and Information Security (CRYPIS 2022)focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists,... more