Coding for Cryptographic Security Enhancement using Stopping Sets
Willie K. HarrisonJoão AlmeidaSteven W. McLaughlinJoão BarrosPublished in: CoRR (2011)
Keyphrases
- security protocols
- security properties
- key management
- smart card
- encryption scheme
- coding scheme
- security requirements
- information security
- secure communication
- security issues
- cryptographic protocols
- encryption decryption
- network security
- fuzzy vault
- intrusion detection
- security mechanisms
- cryptographic algorithms
- high assurance
- elliptic curve cryptography
- image processing
- statistical databases
- random number generator
- stream cipher
- encryption key
- security services
- public key encryption
- security analysis
- public key cryptography
- high security
- countermeasures
- image enhancement
- access control
- security systems
- security model
- authentication protocol
- public key
- coding method
- hash functions
- rate distortion