Cryptography

View this topic in
Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively) is the practice and study of hiding information. (Wikipedia.org)






Conferences related to Cryptography

Back to Top

2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)

The International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) is an annual academic conference in the wireless research arena organized by the Institute of Electrical and Electronics Engineers' Communications Society. This event has emerged as one of the Communications Society flagship conferences in telecommunications with a long history of bringing together academia, industry and regulatory bodies.


2014 IEEE Information Theory Workshop (ITW)

ITW2014 is a forum for technical exchange among scientists and engineers working on the fundamentals of information theory. The agenda is broad and will cover the diverse topics that information theory presently impacts. There will be both invited and contributed sessions.

  • 2012 IEEE Information Theory Workshop (ITW 2012)

    The past decade has seen an exponential increase in the data stored in distributed locations in various forms including corporate & personal data, multimedia, and medical data in repositories. The grand challenge is to store, process and transfer this massive amount of data, efficiently and securely over heterogeneous communication networks.

  • 2010 IEEE Information Theory Workshop (ITW 2010)

    Algebraic Methods in Communications Technology

  • 2009 IEEE Information Theory Workshop (ITW 2009)

    Covers the most relevant topics in Information Theory and Coding Theory of interest to the most recent applications to wireless networks, sensor networks, and biology

  • 2008 IEEE Information Theory Workshop (ITW 2008)

    This workshop will take a brief look into the recent information theory past to commemorate the 60th anniversary of Shannon's landmark paper, and then proceed to explore opportunities for information theory research in quantum computation, biology, statistics, and computer science.

  • 2006 IEEE Information Theory Workshop (ITW 2006)


2014 IEEE International Symposium on Information Theory (ISIT)

Annual international symposium on processing, transmission, storage, and use of information, as well as theoretical and applied aspects of coding, communications, and communications networks.


2013 13th Canadian Workshop on Information Theory (CWIT)

The 13th Canadian Workshop on Information Theory will take place in Toronto, Ontario, Canada from Tuesday, May 28, to Friday, May 31, 2013. Previously unpublished contributions from a broad range of topics in information theory and its applications are solicited, including (but not limited to) the following areas: Coded modulation, Coding theory and practice, Communication complexity, Communication systems, Cryptology and data security, Data compression, Detection and estimation, Information theory and statistics, Network coding, Interactive information theory, Pattern recognition and learning, Quantum information processing, Shannon theory, Signal processing, Cognitive radio, Cooperative communication, Multi-terminal information theory, and Information theory in biology. International researchers are welcome to attend and present research at this event.

  • 2011 12th Canadian Workshop on Information Theory (CWIT)

    Applications and practice of information theory

  • 2009 11th Canadian Workshop on Information Theory (CWIT)

    This workshop provides an opportunity for researchers in Information Theory to meet and discuss aspects of their work.

  • 2007 10th Canadian Workshop on Information Theory (CWIT)


2013 26th International Conference on VLSI Design: concurrently with the 12th International Conference on Embedded Systems

The conference is a forum for researchers and designers to present and discuss various aspects of VLSI design, electronic design automation (EDA), embedded systems, and enabling technologies. It covers the entire spectrum of activities in the two vital areas of very large scale integration (VLSI) and embedded systems, which underpin the semiconductor industry.


More Conferences

Periodicals related to Cryptography

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


More Periodicals

Most published Xplore authors for Cryptography

Back to Top

Xplore Articles related to Cryptography

Back to Top

Design and realization of region weather modification operation conditions website for integrated monitor and analysis in East China

Weifei Jiang; Qi Luo The Fourth International Workshop on Advanced Computational Intelligence, 2011

The region weather modification information operation conditions website system for integrated monitor and analysis based on B/ S (Browser/ Server) mode is developed, which is to meet the need of the weather modification professional work. The system is developed by using the .NET platform and ASP.NET technology. Applying the WebGIS technology, weather modification map release can be realized by using ...


Synchronized chaotic optical communications at high bit rates

Jia-ming Liu; How-foo Chen; Shuo Tang IEEE Journal of Quantum Electronics, 2002

Basic issues regarding synchronized chaotic optical communications at high bit rates using semiconductor lasers are considered. Recent experimental results on broadband, high-frequency, phase-locked chaos synchronization, and message encoding-decoding at 2.5 Gb/s are presented. System performance at a bit rate of 10 Gb/s is numerically studied for the application of three encryption schemes, namely chaos shift keying, chaos masking, and additive ...


A security mechanism of Smart Grid AMI network through smart device mutual authentication

Sangji Lee; Jinsuk Bong; Sunhee Shin; Yongtae Shin The International Conference on Information Networking 2014 (ICOIN2014), 2014

AMI (Advanced Meter Infrastructure), vital component to build next generation electricity grid, is an informatization service infrastructure for electricity between consumers and electricity companies. To manage the quantity of electricity consumed, AMI is composed with bidirectional communication Smart Devices. Authentication mechanism is necessary to have the access control of Smart Devices in Smart Grid communication environment. However, current ID- based ...


Optical communication with synchronized hyperchaos generated electrooptically

J. -P. Goedgebuer; P. Levy; L. Larger; C. -C. Chen; W. T. Rhodes IEEE Journal of Quantum Electronics, 2002

We propose a method based on a scalar second-order difference-differential equation to obtain intensity chaos from a laser diode with a nonlinear delayed feedback. The method can be used for encrypting, transmitting, and decrypting a signal in a chaos-based communication system. The core of the chaotic transmitter and receiver is formed by an electrooptic modulator that is used to generate ...


Semi-fragile watermarking for image content authentication

Liu Tong; Hu Xiangyi; Dai Yiqi Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on, 2004

In this paper, we propose a quantization-based semi-fragile watermarking algorithm for content authentication. The watermark can be blindly extracted. The formulation of judge threshold is given from the point of probability theory. The tempered areas of watermarked image can be distinguished by the predefined threshold. Our scheme is robust to incidental manipulations while fragile to malicious distortions, and can distinguish ...


More Xplore Articles

Educational Resources on Cryptography

Back to Top

eLearning

Design and realization of region weather modification operation conditions website for integrated monitor and analysis in East China

Weifei Jiang; Qi Luo The Fourth International Workshop on Advanced Computational Intelligence, 2011

The region weather modification information operation conditions website system for integrated monitor and analysis based on B/ S (Browser/ Server) mode is developed, which is to meet the need of the weather modification professional work. The system is developed by using the .NET platform and ASP.NET technology. Applying the WebGIS technology, weather modification map release can be realized by using ...


Synchronized chaotic optical communications at high bit rates

Jia-ming Liu; How-foo Chen; Shuo Tang IEEE Journal of Quantum Electronics, 2002

Basic issues regarding synchronized chaotic optical communications at high bit rates using semiconductor lasers are considered. Recent experimental results on broadband, high-frequency, phase-locked chaos synchronization, and message encoding-decoding at 2.5 Gb/s are presented. System performance at a bit rate of 10 Gb/s is numerically studied for the application of three encryption schemes, namely chaos shift keying, chaos masking, and additive ...


A security mechanism of Smart Grid AMI network through smart device mutual authentication

Sangji Lee; Jinsuk Bong; Sunhee Shin; Yongtae Shin The International Conference on Information Networking 2014 (ICOIN2014), 2014

AMI (Advanced Meter Infrastructure), vital component to build next generation electricity grid, is an informatization service infrastructure for electricity between consumers and electricity companies. To manage the quantity of electricity consumed, AMI is composed with bidirectional communication Smart Devices. Authentication mechanism is necessary to have the access control of Smart Devices in Smart Grid communication environment. However, current ID- based ...


Optical communication with synchronized hyperchaos generated electrooptically

J. -P. Goedgebuer; P. Levy; L. Larger; C. -C. Chen; W. T. Rhodes IEEE Journal of Quantum Electronics, 2002

We propose a method based on a scalar second-order difference-differential equation to obtain intensity chaos from a laser diode with a nonlinear delayed feedback. The method can be used for encrypting, transmitting, and decrypting a signal in a chaos-based communication system. The core of the chaotic transmitter and receiver is formed by an electrooptic modulator that is used to generate ...


Semi-fragile watermarking for image content authentication

Liu Tong; Hu Xiangyi; Dai Yiqi Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on, 2004

In this paper, we propose a quantization-based semi-fragile watermarking algorithm for content authentication. The watermark can be blindly extracted. The formulation of judge threshold is given from the point of probability theory. The tempered areas of watermarked image can be distinguished by the predefined threshold. Our scheme is robust to incidental manipulations while fragile to malicious distortions, and can distinguish ...


More eLearning Resources

IEEE-USA E-Books

  • Security

    This chapter contains sections titled: Introduction Potential Attacks to Computer Systems Cryptography Authentication Access Control Digital Signatures Design Principles Case Study: DCE Security Service Summary This chapter contains sections titled: Exercises Bibliography Pointers to Bibliographies on the Internet

  • Morcom

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.

  • Protocols

    The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.

  • TESLA-based Broadcast Authentication

    This chapter explores ways to use fast symmetric cryptography to protect vehicular communications, but without direct involvement of RSUs. It focuses on the timed efficient stream loss-tolerant authentication (TESLA) authentication protocol, which is commonly used in securing broadcast and multicast communication. In addition, since only a short message authentication code (MAC) tag is attached to each message, the extra message length and the bandwidth overhead due to the security mechanism can be significantly reduced. The chapter presents the design of a TESLA-based broadcast authentication scheme for vehicular communication, termed TSVC. It begins by providing a brief introduction to the techniques used here, which serve as the basis for the proposed scheme, and then presents the scheme. Finally, the chapter analyzes security through rigorous analysis and conducts performance evaluations through extensive simulation.

  • Turing's Test

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.

  • Trapped

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.

  • Quantum Information Theory

    We survey the field of quantum information theory. In particular, we discuss the fundamentals of the field, source coding, quantum error-correcting codes, capacities of quantum channels, measures of entanglement, and quantum cryptography.

  • They'll kill me

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.

  • Alexandros

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.

  • Ian and Turing

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.



Standards related to Cryptography

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


More Standards