This paper presents several methods to construct trapdoor block ciphers. A trapdoor cipher contains some hidden structure; knowledge of this structure allows an attacker to obtain ...
Abstract. Recently, the Csignature scheme has been completely broken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and other multivariate public key systems hav...
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
The Advanced Encryption Standard (AES) is the most widely deployed block cipher. It follows the modern iterated block cipher approach, iterating a simple round function multiple ti...
The fingerprint verification methods include minutiae-based and image-based methods. The minutiae-based method has been frequently used, but it has limitations in performance. Thes...
Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung B...