scispace - formally typeset
Open AccessJournal ArticleDOI

Review of the use of human senses and capabilities in cryptography

TLDR
This paper reviews the previous research on utilizing human senses and capabilities in cryptography, and proposes several topics and problems that need to be solved in order to build cryptography that is more accessible to humans.
About
This article is published in Computer Science Review.The article was published on 2021-02-01 and is currently open access. It has received 9 citations till now. The article focuses on the topics: Key (cryptography) & Cryptography.

read more

Citations
More filters
Journal ArticleDOI

2D eπ-map for image encryption

TL;DR: In this article , a 2D chaotic map based on Euler and Pi numbers, called eπ-map, is presented, which exploits infinity diversity attribute of these numbers and a diffusion operation referred to as bit reversion is proposed for manipulating the pixel value.
Journal Article

Human Computing for Handling Strong Corruptions in Authenticated Key Exchange.

TL;DR: In this paper, the authors define the security model for Human Authenticated Key Exchange (HAKE) protocols and propose two generic protocols based on human compatible function family, password-authenticated key exchange (PAKE), commitment, and authenticated encryption.
Proceedings ArticleDOI

(2,2) Visual Cryptography Based Biometric Authentication Mechanism for Online Elections

TL;DR: In this article , the voter authentication mechanism using fingerprint matching is proposed and fingerprint matching can be considered as one of the key steps towards voter authentication along with visual cryptography along with voter authentication.
Journal ArticleDOI

Сучасні методи шифрування за допомогою алгоритму RC4

M. Petruk, +1 more
TL;DR: This article will discuss the RC4 algorithm, also known as ARC4 or ARCFOUR – streaming cipher, which is widely used in various information security systems in computer networks (eg, SSL and TLS, wireless security algorithms WEP and WPA).
Proceedings ArticleDOI

(2,2) Visual Cryptography Based Biometric Authentication Mechanism for Online Elections

TL;DR: This paper proposes the very first step towards new way of voting that is voter authentication using fingerprint matching which can be considered as one of the key steps towards voter authentication along with visual cryptography.
References
More filters
Proceedings ArticleDOI

An extended visual cryptography scheme without pixel expansion for halftone images

TL;DR: This paper proposes a method for processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the shares and the recoverable image is the same as for the original halftones secret image.
Proceedings ArticleDOI

Towards a practical, secure, and very large scale online election

TL;DR: It is shown that even if all voters follow the Sensus protocol honestly, some voters' votes may still be replaced with different votes without being detected, and the proposed protocol overcomes these drawbacks.
Book ChapterDOI

Revisiting Legal and Regulatory Requirements for Secure E-Voting

TL;DR: This paper addresses the democracy-oriented legal and constitutional requirements that an electronic voting system has to comply with.
Proceedings ArticleDOI

Groupthink: usability of secure group association for wireless devices

TL;DR: In this article, the authors discuss desirable features and evaluation criteria for secure group association, identifies suitable methods and presents a comparative usability study, showing that simple methods (e.g., peer- or leader-based number comparisons) are quite attractive for small groups, being fast, reasonably secure and well-received by users.
Journal ArticleDOI

A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices

TL;DR: This paper presents a bipartite and a tripartite authentication protocol using a temporary confidential channel and extends the system into a transitive authentication protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
Related Papers (5)