Results 91 to 100 of about 856 (103)

Periodic structure of the exponential pseudorandom number generator

open access: yes, 2014
KasziƔn, J., Moree, P., Shparlinski, I.
core  

Semiring Actions for Public Key Cryptography

Journal of Computer and Mathematical Sciences, 2019
In this paper we give a protocol for public key sharing and encryption and decryption of plaintext using semiring action problem which is a generalization of discrete logarithmic problem. AMS Classification: 16Y60, 11T71, 14G50, 94A60.
S. Nivetha   +2 more
semanticscholar   +1 more source

Attacking (EC)DSA With Partially Known Multiples of Nonces

IACR Cryptology ePrint Archive
In this paper, we improve the theoretical background of the attacks on the DSA schemes given in [1, 29], and we present some new more practical attacks. MSC 2010: 94A60, 11T71, 11Y16.
M. Adamoudis, K. Draziotis, D. Poulakis
semanticscholar   +1 more source

Advanced threshold signature schemes leveraging isogeny-based cryptography

Global Journal of Engineering and Technology Advances
This paper investigates the use of threshold signature schemes in isogeny-based cryptosystems. By leveraging the distinct features of isogeny graphs, we propose a protocol that offers high security and practical efficiency, making it ideal for ...
Mohammed El Baraka, Siham Ezzouak
semanticscholar   +1 more source

Optimizations for NTRU

, 2001
J. Hoffstein, J. Silverman
semanticscholar   +1 more source

Novel Zaslavsky Map Based Pseudorandom Bit Generation Scheme

, 2014
B. Stoyanov   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy