Abstract: A blind signature enables a user to obtain signatures on any message from an authority who cannot acquire any information on the message being signed. A blind ring signature scheme is ...
A basic Substitution-Permutation Network (SPN) cipher and it's cryptanalysis using the linear method. Implemented by following 'A Tutorial on Linear and Differential Cryptanalysis' by Howard M. Heys.
Abstract: At ISIT 2008, Aguilar Melchor, Castagnos and Gaborit presented a lattice-based homomorphic encryption scheme (abbreviated as MCG). Its security is based on the Computational Knapsack Vector ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results