- Full text PDF available (2)
This paper presents the quartic public key transformation which can be used for public key applications if side information is also used. This extends an earlier work where the cubic transformation was similarly used. Such a transformation can be used in multiparty communications protocols.
This paper presents results on generalized public key cryptography with exponentials modulo primes and composite numbers where the mapping is not one-to-one and the uniqueness is achieved by additional side information. Such transformations may be used for oblivious transfer and generate events of specific probabilities.
Now a day's human identification through Image processing is one of the emerging requirements in the world. The use of X-rays is generally used in detection of cracks and fractures in bones. This paper presents a novel & more efficient kind of approach for human identification using feature vector extraction of carpus bones. We will be focusing on the… (More)