Cryptography

View this topic in
Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively) is the practice and study of hiding information. (Wikipedia.org)






Conferences related to Cryptography

Back to Top

2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)

The International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) is an annual academic conference in the wireless research arena organized by the Institute of Electrical and Electronics Engineers' Communications Society. This event has emerged as one of the Communications Society flagship conferences in telecommunications with a long history of bringing together academia, industry and regulatory bodies.


2014 IEEE Information Theory Workshop (ITW)

ITW2014 is a forum for technical exchange among scientists and engineers working on the fundamentals of information theory. The agenda is broad and will cover the diverse topics that information theory presently impacts. There will be both invited and contributed sessions.

  • 2012 IEEE Information Theory Workshop (ITW 2012)

    The past decade has seen an exponential increase in the data stored in distributed locations in various forms including corporate & personal data, multimedia, and medical data in repositories. The grand challenge is to store, process and transfer this massive amount of data, efficiently and securely over heterogeneous communication networks.

  • 2010 IEEE Information Theory Workshop (ITW 2010)

    Algebraic Methods in Communications Technology

  • 2009 IEEE Information Theory Workshop (ITW 2009)

    Covers the most relevant topics in Information Theory and Coding Theory of interest to the most recent applications to wireless networks, sensor networks, and biology

  • 2008 IEEE Information Theory Workshop (ITW 2008)

    This workshop will take a brief look into the recent information theory past to commemorate the 60th anniversary of Shannon's landmark paper, and then proceed to explore opportunities for information theory research in quantum computation, biology, statistics, and computer science.

  • 2006 IEEE Information Theory Workshop (ITW 2006)


2014 IEEE International Symposium on Information Theory (ISIT)

Annual international symposium on processing, transmission, storage, and use of information, as well as theoretical and applied aspects of coding, communications, and communications networks.


2013 13th Canadian Workshop on Information Theory (CWIT)

The 13th Canadian Workshop on Information Theory will take place in Toronto, Ontario, Canada from Tuesday, May 28, to Friday, May 31, 2013. Previously unpublished contributions from a broad range of topics in information theory and its applications are solicited, including (but not limited to) the following areas: Coded modulation, Coding theory and practice, Communication complexity, Communication systems, Cryptology and data security, Data compression, Detection and estimation, Information theory and statistics, Network coding, Interactive information theory, Pattern recognition and learning, Quantum information processing, Shannon theory, Signal processing, Cognitive radio, Cooperative communication, Multi-terminal information theory, and Information theory in biology. International researchers are welcome to attend and present research at this event.

  • 2011 12th Canadian Workshop on Information Theory (CWIT)

    Applications and practice of information theory

  • 2009 11th Canadian Workshop on Information Theory (CWIT)

    This workshop provides an opportunity for researchers in Information Theory to meet and discuss aspects of their work.

  • 2007 10th Canadian Workshop on Information Theory (CWIT)


2013 26th International Conference on VLSI Design: concurrently with the 12th International Conference on Embedded Systems

The conference is a forum for researchers and designers to present and discuss various aspects of VLSI design, electronic design automation (EDA), embedded systems, and enabling technologies. It covers the entire spectrum of activities in the two vital areas of very large scale integration (VLSI) and embedded systems, which underpin the semiconductor industry.


More Conferences

Periodicals related to Cryptography

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


More Periodicals


Xplore Articles related to Cryptography

Back to Top

Encryption using random keys-a scheme for secure communications

P. K. Goyal; E. B. Fernandez Aerospace Computer Security Applications Conference, 1988., Fourth, 1988

An encryption scheme using a random key generator with memory is presented. This system generates a random sequence of encryption/decryption keys. A feedback mechanism is used to endow the key generator with memory, thereby making it difficult to infer the random key sequence from a partial sequence of keys. The random key sequence is independent of the encrypting algorithm and ...


Optimal State Management of Data Sharing in Online Social Network (OSN) Services

Joon S. Park; Sookyung Kim; Charles A. Kamhoua; Kevin A. Kwiat 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012

Although Online Social Network (OSN) services offer users a variety of benefits, they also bring new threats and privacy issues to the community. In this paper, we first define the data types in OSN services and the states of shared data with respect to Optimal, Under-shared, Over-shared, and Hybrid states. We also identify the facilitating, detracting, and preventive parameters that ...


A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET

Qiwei Lu; Yan Xiong; Wenchao Huang; Xudong Gong; Fuyou Miao 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012

With the rapid development of MANET, the secure and practical authentication problem in it increasingly becomes outstanding. The existing work study the problem from two aspects, i.e. secure key division/distributed storage and secure distributed authentication. But existing cheating problems and fault attack possibility will break the security. Besides, efficiency performance of such schemes is not good enough due to the ...


Emerging Physical Unclonable Functions With Nanotechnology

Yansong Gao; Damith C. Ranasinghe; Said F. Al-Sarawi; Omid Kavehei; Derek Abbott IEEE Access, 2016

Physical unclonable functions (PUFs) are increasingly used for authentication and identification applications as well as the cryptographic key generation. An important feature of a PUF is the reliance on minute random variations in the fabricated hardware to derive a trusted random key. Currently, most PUF designs focus on exploiting process variations intrinsic to the CMOS technology. In recent years, progress ...


CdSe/CdS nanocrystals coupled to a self-assembled plasmonic crystal

H. Frederich; F. Wen; J. Laverdant; L. Coolen; C. Schwob; C. Javaux; B. Dubertret; A. Maî tre Lasers and Electro-Optics Europe (CLEO EUROPE/EQEC), 2011 Conference on and 12th European Quantum Electronics Conference, 2011

We report here the fabrication of gold surfaces with a two-dimensional periodic corrugation by taking advantage of inexpensive self-assembly techniques. We use silica opals as a template for the 2D pattern. Opals are 3D photonic crystals obtained by self-assembly of dielectric nano-spheres. An optically thick gold layer is evaporated onto the surface of the opal to create a periodically corrugated ...


More Xplore Articles

Educational Resources on Cryptography

Back to Top

eLearning

Encryption using random keys-a scheme for secure communications

P. K. Goyal; E. B. Fernandez Aerospace Computer Security Applications Conference, 1988., Fourth, 1988

An encryption scheme using a random key generator with memory is presented. This system generates a random sequence of encryption/decryption keys. A feedback mechanism is used to endow the key generator with memory, thereby making it difficult to infer the random key sequence from a partial sequence of keys. The random key sequence is independent of the encrypting algorithm and ...


Optimal State Management of Data Sharing in Online Social Network (OSN) Services

Joon S. Park; Sookyung Kim; Charles A. Kamhoua; Kevin A. Kwiat 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012

Although Online Social Network (OSN) services offer users a variety of benefits, they also bring new threats and privacy issues to the community. In this paper, we first define the data types in OSN services and the states of shared data with respect to Optimal, Under-shared, Over-shared, and Hybrid states. We also identify the facilitating, detracting, and preventive parameters that ...


A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET

Qiwei Lu; Yan Xiong; Wenchao Huang; Xudong Gong; Fuyou Miao 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012

With the rapid development of MANET, the secure and practical authentication problem in it increasingly becomes outstanding. The existing work study the problem from two aspects, i.e. secure key division/distributed storage and secure distributed authentication. But existing cheating problems and fault attack possibility will break the security. Besides, efficiency performance of such schemes is not good enough due to the ...


Emerging Physical Unclonable Functions With Nanotechnology

Yansong Gao; Damith C. Ranasinghe; Said F. Al-Sarawi; Omid Kavehei; Derek Abbott IEEE Access, 2016

Physical unclonable functions (PUFs) are increasingly used for authentication and identification applications as well as the cryptographic key generation. An important feature of a PUF is the reliance on minute random variations in the fabricated hardware to derive a trusted random key. Currently, most PUF designs focus on exploiting process variations intrinsic to the CMOS technology. In recent years, progress ...


CdSe/CdS nanocrystals coupled to a self-assembled plasmonic crystal

H. Frederich; F. Wen; J. Laverdant; L. Coolen; C. Schwob; C. Javaux; B. Dubertret; A. Maî tre Lasers and Electro-Optics Europe (CLEO EUROPE/EQEC), 2011 Conference on and 12th European Quantum Electronics Conference, 2011

We report here the fabrication of gold surfaces with a two-dimensional periodic corrugation by taking advantage of inexpensive self-assembly techniques. We use silica opals as a template for the 2D pattern. Opals are 3D photonic crystals obtained by self-assembly of dielectric nano-spheres. An optically thick gold layer is evaporated onto the surface of the opal to create a periodically corrugated ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Cryptography"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Cryptography"



Standards related to Cryptography

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


More Standards