Ara
Toplam kayıt 13, listelenen: 1-10
On the hadamard product of balancing matrix and balancing matrix
(Işık University Press, 2015)
In this paper, the matrix QnB ◦ Q−nB which is the Hadamard product of both balancing QnB matrix and balancing Q−nB matrix is introduced. Some properties of the Hadamard product of these matrices are investigated. A different ...
On key exchange method via topological concepts
(Işık University Press, 2019)
Key exchange algorithms such as the Diffie-Hellman method are used to determine a common secret key which will be used in symmetric key algorithms in cryptography. In this paper, we give a key exchange algorithm which ...
Kaotik kriptografinin çilesi
(IEEE, 2013-06-13)
Son yirmi yıldır araştırılan bir konu olmasına rağmen, kaotik kriptografi ana akım kriptografi literatüründe yer almıyor. Bu makalede, bu ayrımın nedenleri üzerinde durulmuştur.
Deterministic generation of large scale atomic W states
(Optical Soc Amer, 2016-05-30)
We present a deterministic scheme for generating large-scale atomic W states in a cavity QED system via a simple expansion mechanism, which is realized only by a detuned interaction between two identical atoms and a vacuum ...
Breaking an orbit-based symmetric cryptosystem
(Pergamon-Elsevier Science Ltd, 2011-09)
We report a break for a recently proposed class of cryptosystems. The cryptosystem uses constant points of a periodic secret orbit to encrypt the plaintext. In order to break the system, it suffices to sort the constant ...
SIMSec: A key exchange protocol between SIM card and service provider
(Springer New York LLC, 2016-08-01)
Mobile technology is so popular and overdosed adoption is inevitable in today’s world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure ...
Generating multi-atom entangled W states via light-matter interface based fusion mechanism
(Nature Publishing Group, 2015-11-09)
W state is a key resource in quantum communication. Fusion technology has been proven to be a good candidate for preparing a large-size W state from two or more small-size W states in linear optical system. It is of great ...
Design of a key exchange protocol between SIM card and service provider
(Institute of Electrical and Electronics Engineers Inc., 2015-11-05)
Current capabilities of smart cards, Smartphones, and cellular network provoke companies to provide vast amount of services to the mobile users. Some of those services require end-to-end encryption between a Service Provider ...
Cryptanalysis of Chaotic Ciphers
(Springer-Verlag Berlin, 2011)
[No abstract available]
A hybrid approach to private record matching
(IEEE Computer Soc, 2012-10)
Real-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the ...