7,798 research outputs found
NumTheoryPy library v.1: for cryptography education and software design
This work develops an open source library in Python with applications in academic settings, for educational purposes. It can also be used for general software development. It allows users to implement Number Theory applications commonly employed in Cryptography and Information System Security. Improvements in teaching quality, user software readability, and time savings at the encoding stage could be expected.IV Workshop Arquitectura, Redes y Sistemas Operativos (WARSO)Red de Universidades con Carreras en Informática (RedUNCI
NumTheoryPy library v.1: for cryptography education and software design
This work develops an open source library in Python with applications in academic settings, for educational purposes. It can also be used for general software development. It allows users to implement Number Theory applications commonly employed in Cryptography and Information System Security. Improvements in teaching quality, user software readability, and time savings at the encoding stage could be expected.IV Workshop Arquitectura, Redes y Sistemas Operativos (WARSO)Red de Universidades con Carreras en Informática (RedUNCI
UK’s Implementation of the Anti-Circumvention Provisions of the EU Copyright Directive: An Analysis
The debate surrounding utilization of technological protection measures to secure copyrighted works in the digital arena has raised many an eyebrow in the past few years. Technological protection measures are broadly bifurcated into two categories: access control measures such as cryptography, passwords and digital signatures that secure the access to information and protected content, and copy control measures such as the serial copy management system for audio digital taping devices and content scrambling systems for DVDs that prevent third parties from exploiting the exclusive rights of the copyright owners. Copyright owners have been wary of the digital environment to exploit and distribute their works and therefore employ technological protection measures, whereas consumers and proponents of free speech favor the free and unrestricted access, use and dissemination of copyrighted works digitally
A Low-Cost Unified Experimental FPGA Board for Cryptography Applications
This paper describes the evaluation of available
experimental boards, the comparison of their supported set
of experiments and other aspects. The second part of this
evaluation is focused on the design process of the PCB (Printed
Circuit Board) for an FPGA (Field Programmable Gate Array)
based cryptography environment suitable for evaluating the latest
trends in the IC (Integrated Circuit) security like Side–Channel
Attacks (SCA) or Physically Unclonable Function (PUF). It
leads to many criteria affecting the design process and also the
suitability for evaluating and measuring results of the attacks and
their countermeasures. The developed system should be open,
versatile and unrestricted by the U.S. law [1]
Managing the boundary of an 'open' project
In the past ten years, the boundaries between public and open science and commercial research efforts have become more porous. Scholars have thus more critically examined ways in which these two institutional regimes intersect. Large open source software projects have also attracted commercial collaborators and now struggle to develop code in an open public environment that still protects their communal boundaries. This research applies a dynamic social network approach to understand how one community-managed software project, Debian, developed a membership process. We examine the project's face-to-face social network over a five-year period (1997-2001) to see how changes in the social structure affected the evolution of membership mechanisms and the determination of gatekeepers. While the amount and importance of a contributor's work increased the probability that a contributor would become a gatekeeper, those more central in the social network were more likely to become gatekeepers and influence the membership process. A greater understanding of the mechanisms open projects use to manage their boundaries has critical implications for research and knowledge-producing communities operating in pluralistic, open and distributed environments.open source software; social networks; organizational design; institutional design;
PLACE Events 2016-2017
This document describes PLACE events at Linfield College for 2016-2017
- …