Ara
Toplam kayıt 12, listelenen: 1-10
On the hadamard product of balancing matrix and balancing matrix
(Işık University Press, 2015)
In this paper, the matrix QnB ◦ Q−nB which is the Hadamard product of both balancing QnB matrix and balancing Q−nB matrix is introduced. Some properties of the Hadamard product of these matrices are investigated. A different ...
Kaotik kriptografinin çilesi
(IEEE, 2013-06-13)
Son yirmi yıldır araştırılan bir konu olmasına rağmen, kaotik kriptografi ana akım kriptografi literatüründe yer almıyor. Bu makalede, bu ayrımın nedenleri üzerinde durulmuştur.
Deterministic generation of large scale atomic W states
(Optical Soc Amer, 2016-05-30)
We present a deterministic scheme for generating large-scale atomic W states in a cavity QED system via a simple expansion mechanism, which is realized only by a detuned interaction between two identical atoms and a vacuum ...
Breaking an orbit-based symmetric cryptosystem
(Pergamon-Elsevier Science Ltd, 2011-09)
We report a break for a recently proposed class of cryptosystems. The cryptosystem uses constant points of a periodic secret orbit to encrypt the plaintext. In order to break the system, it suffices to sort the constant ...
SIMSec: A key exchange protocol between SIM card and service provider
(Springer New York LLC, 2016-08-01)
Mobile technology is so popular and overdosed adoption is inevitable in today’s world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure ...
Generating multi-atom entangled W states via light-matter interface based fusion mechanism
(Nature Publishing Group, 2015-11-09)
W state is a key resource in quantum communication. Fusion technology has been proven to be a good candidate for preparing a large-size W state from two or more small-size W states in linear optical system. It is of great ...
Design of a key exchange protocol between SIM card and service provider
(Institute of Electrical and Electronics Engineers Inc., 2015-11-05)
Current capabilities of smart cards, Smartphones, and cellular network provoke companies to provide vast amount of services to the mobile users. Some of those services require end-to-end encryption between a Service Provider ...
Cryptanalysis of Chaotic Ciphers
(Springer-Verlag Berlin, 2011)
[No abstract available]
A hybrid approach to private record matching
(IEEE Computer Soc, 2012-10)
Real-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the ...
Cryptanalysis of a multi-chaotic systems based image cryptosystem
(Elsevier Science BV, 2010-01-15)
This paper is a cryptanalysis of a recently proposed multi-chaotic systems based image cryptosystem. The cryptosystem is composed of two shuffling stages parameterized by chaotically generated sequences. We propose and ...