Abstract: A blind signature enables a user to obtain signatures on any message from an authority who cannot acquire any information on the message being signed. A blind ring signature scheme is ...
A basic Substitution-Permutation Network (SPN) cipher and it's cryptanalysis using the linear method. Implemented by following 'A Tutorial on Linear and Differential Cryptanalysis' by Howard M. Heys.
Abstract: At ISIT 2008, Aguilar Melchor, Castagnos and Gaborit presented a lattice-based homomorphic encryption scheme (abbreviated as MCG). Its security is based on the Computational Knapsack Vector ...