Search results for "Encryption"

showing 10 items of 94 documents

Fractional Fourier transform dual random phase encoding of time-varying signals

2008

Optical techniques have shown great potential in the field of information security to encode high-security images. Among several established methods, a double-random phase encryption technique (DRPE) for encoding a primary image into stationary white noise was developed by using the analogy between Fresnel diffraction patterns and the fractional Fourier transform (FrFT-DRPE). In this case, additional keys are obtained through the knowledge of the fractional orders of the FrFTs. In this work we propose an encoding setup for time-varying signals, mainly for short-haul fiber optics link applications, that can be considered as the temporal analogue of the spatial FrFT-DRPE. The behavior of the …

Computer sciencebusiness.industryBandwidth (signal processing)Phase (waves)White noiseEncryptionSignalAtomic and Molecular Physics and OpticsFractional Fourier transformElectronic Optical and Magnetic MaterialsOpticsEncoding (memory)Wigner distribution functionElectrical and Electronic EngineeringPhysical and Theoretical ChemistrybusinessFresnel diffractionOptics Communications
researchProduct

New key based on tilted lenses for optical encryption

2016

A novel concept based on tilted spherical lenses for optical encryption using Lohmann’s type I systems is presented. The tilt angle of the spherical lenses is used as an encrypted key and the decryption performance is studied both qualitatively (visual image degradation) and quantitatively (mean squared error analysis) by numerical simulations. The paper presents a general mathematical framework in virtue of the dioptric power matrix formalism and oblique central refraction used in the optometry field. Computer simulations show that image information cannot be retrieved after a few degrees of tilt on both spherical lenses in the encryption system. In addition, a preliminary experiment is pr…

Computer sciencebusiness.industryMaterials Science (miscellaneous)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONEncryption01 natural sciencesGeneralLiterature_MISCELLANEOUSIndustrial and Manufacturing EngineeringOptical encryption010309 optics03 medical and health sciences0302 clinical medicineOpticsComputer Science::Multimedia0103 physical sciences030221 ophthalmology & optometryHybrid cryptosystemBusiness and International ManagementbusinessComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and SecurityApplied Optics
researchProduct

Exploiting Cryo-EM Structural Information and All-Atom Simulations To Decrypt the Molecular Mechanism of Splicing Modulators.

2019

Splicing modulators (SMs) pladienolides, herboxidienes, and spliceostatins exert their antitumor activity by altering the ability of SF3B1 and PHF5A proteins, components of SF3b splicing factor, to recognize distinct intron branching point sequences, thus finely calibrating constitutive/alternative/aberrant splicing of pre-mRNA. Here, by exploiting structural information obtained from cryo-EM data, and by performing multiple μs-long all-atom simulations of SF3b in apo form and in complex with selected SMs, we disclose how these latter seep into the narrow slit at the SF3B1/PHF5A protein interface. This locks the intrinsic open/closed conformational transitions of SFB1's solenoidal structure…

Cryo-electron microscopyGeneral Chemical EngineeringRNA SplicingComputational biologyLibrary and Information SciencesEncryption01 natural sciencesSplicing factorAtom (programming language)0103 physical sciencesRNA PrecursorsAberrant splicingPhysics010304 chemical physicsbusiness.industryCryoelectron MicroscopyIntronGeneral ChemistryPhosphoproteins0104 chemical sciencesComputer Science Applications010404 medicinal & biomolecular chemistrySettore CHIM/03 - Chimica Generale E InorganicaRNA splicingMolecular mechanismRNA Splicing FactorsbusinessJournal of chemical information and modeling
researchProduct

A Note on Keys and Keystreams of Chacha20 for Multi-key Channels

2018

In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.

Cybersecuritybusiness.industryComputer scienceKeystreamBoundary (topology)Stream cipher020206 networking & telecommunications02 engineering and technologyRC4Symmetric-key algorithmChacha200202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHardware_ARITHMETICANDLOGICSTRUCTURESbusinessSymmetric encryptionStream cipherAlgorithm
researchProduct

An efficient VM-based software protection

2011

This paper presents Truly-protect, a system, incorporating a virtual machine, that enables execution of encrypted programs. Our intention is to form a framework for a conditional access/digital rights management system.

Digital rights managementbusiness.industryComputer scienceSoftware protectionCryptographyConditional accessEncryptioncomputer.software_genreSoftwareVirtual machineEmbedded systemOperating systembusinesscomputerDigital rights management system2011 5th International Conference on Network and System Security
researchProduct

Regular Varieties of Automata and Coequations

2015

In this paper we use a duality result between equations and coequations for automata, proved by Ballester-Bolinches, Cosme-Ll´opez, and Rutten to characterize nonempty classes of deterministic automata that are closed under products, subautomata, homomorphic images, and sums. One characterization is as classes of automata defined by regular equations and the second one is as classes of automata satisfying sets of coequations called varieties of languages. We show how our results are related to Birkhoff’s theorem for regular varieties.

Discrete mathematicsData ScienceDuality (mathematics)Homomorphic encryptionCharacterization (mathematics)Nonlinear Sciences::Cellular Automata and Lattice GasesAutomatonDeterministic automatonComputingMethodologies_DOCUMENTANDTEXTPROCESSINGQuantum finite automataLecture Notes in Computer ScienceÀlgebraAlgebra over a fieldComputer Science::Formal Languages and Automata TheoryAutomatitzacióMathematics
researchProduct

Nonmalleable encryption of quantum information

2008

We introduce the notion of "non-malleability" of a quantum state encryption scheme (in dimension d): in addition to the requirement that an adversary cannot learn information about the state, here we demand that no controlled modification of the encrypted state can be effected. We show that such a scheme is equivalent to a "unitary 2-design" [Dankert et al.], as opposed to normal encryption which is a unitary 1-design. Our other main results include a new proof of the lower bound of (d^2-1)^2+1 on the number of unitaries in a 2-design [Gross et al.], which lends itself to a generalization to approximate 2-design. Furthermore, while in prime power dimension there is a unitary 2-design with =…

Discrete mathematicsQuantum Physicsbusiness.industryDimension (graph theory)FOS: Physical sciencesStatistical and Nonlinear PhysicsState (functional analysis)Encryption01 natural sciencesUnitary stateUpper and lower bounds010305 fluids & plasmasQuantum state0103 physical sciencesQuantum informationQuantum Physics (quant-ph)010306 general physicsbusinessPrime powerMathematical PhysicsComputer Science::Cryptography and SecurityMathematicsJournal of Mathematical Physics
researchProduct

Requirements for XML document database systems

2001

The shift from SGML to XML has created new demands for managing structured documents. Many XML documents will be transient representations for the purpose of data exchange between different types of applications, but there will also be a need for effective means to manage persistent XML data as a database. In this paper we explore requirements for an XML database management system. The purpose of the paper is not to suggest a single type of system covering all necessary features. Instead the purpose is to initiate discussion of the requirements arising from document collections, to offer a context in which to evaluate current and future solutions, and to encourage the development of proper …

Document Structure DescriptionXML EncryptionDatabaseComputer scienceEfficient XML InterchangeXML validationcomputer.file_formatDocument type definitioncomputer.software_genreXML databaseXML Schema EditorStreaming XMLComputingMethodologies_DOCUMENTANDTEXTPROCESSINGcomputerProceedings of the 2001 ACM Symposium on Document engineering
researchProduct

Ontology-based integration of XML data: Schematic marks as a bridge between syntax and semantic level

2007

This paper presents an ontology integration approach of XML data. The approach is composed of two pillars the first of which is based on formal language and XML grammars analysis. The second pillar is based on ontology and domain ontology analysis. The keystone of this architecture which creates a bridge between the two pillars is based on the concept of schematic marks introduced in this paper. These schematic marks make it possible to establish the link between the syntactic level and the semantic level for our integration framework.

Document Structure DescriptionXML EncryptionInformation retrievalComputer scienceXML Schema EditorOntology-based data integrationStreaming XMLXML validationXML schemaOntology (information science)computercomputer.programming_language
researchProduct

XML document-grammar comparison: related problems and applications

2011

10.2478/s13537-011-0005-1; International audience; XML document comparison is becoming an ever more popular research issue due to the increasingly abundant use of XML. Likewise, a growing interest fosters the development of XML grammar matching and comparison, due to the proliferation of heterogeneous XML data sources, particularly on the Web. Nonetheless, the process of comparing XML documents with XML grammars, i.e., XML document and grammar similarity evaluation, has not yet received the attention it deserves. In this paper, we provide an overview on existing research related to XML document/grammar comparison, presenting the background and discussing the various techniques related to th…

Document Structure DescriptionXML grammarXML Encryptionselective disseminationGeneral Computer ScienceComputer scienceEfficient XML Interchange[SCCO.COMP]Cognitive science/Computer scienceWell-formed document02 engineering and technologyWorld Wide WebXML Schema Editor[SCCO.COMP] Cognitive science/Computer science020204 information systemsStreaming XML0202 electrical engineering electronic engineering information engineeringPROCESSAMENTO DE IMAGENSXML schemacomputer.programming_languageInformation retrievalXSDgrammar evolutionXML validationstructural similarityQA75.5-76.95computer.file_formatXMLDTDclassificationElectronic computers. Computer science[ SCCO.COMP ] Cognitive science/Computer scienceComputingMethodologies_DOCUMENTANDTEXTPROCESSING020201 artificial intelligence & image processingsemi-structured datacomputerclusteringstructure transformation
researchProduct