Results 81 to 90 of about 284 (159)

Fully Dynamic Advanced Encryption Standard

open access: yesIEEE Access
As the reliance on using electronic services increases, the use of a strong encryption algorithm becomes paramount. The AES is the most widely used cipher. However, AES uses static transformations that attackers might exploit to cryptanalyze AES. In this
Shiraz Naserelden   +3 more
doaj   +1 more source

Algebraic Cryptanalysis of Block Ciphers

open access: yesProceedings of the 2019 International Conference on Wireless Communication, Network and Multimedia Engineering (WCNME 2019), 2019
Nursulu Kapalova   +3 more
openaire   +1 more source

Algebraic cryptanalysis of HFE and Filter Generators.

open access: yes, 2003
HFE (Hidden Fields Equations) is a public key cryptosystem using polynomial operations over finite fields. It has been proposed by Jacques Patarin at Eurocrypt 96 following the ideas of Matsumoto and Imai. It has long been regarded as a very promising cryptosystem because it can be used to produce signatures as short as 128, 100 and even 80 bits.
openaire   +2 more sources

On the quantum security of high-dimensional RSA protocol

open access: yesJournal of Mathematical Cryptology
The idea of extending the classical RSA protocol using algebraic number fields was introduced by Takagi and Naito (Construction of RSA cryptosystem over the algebraic field using ideal theory and investigation of its security.
Rahmani Nour-eddine   +3 more
doaj   +1 more source

Cryptanalysis of RSA Using Algebraic and Lattice Methods

open access: yesJournal of Artificial Intelligence and Engineering Applications (JAIEA)
This paper applies tools from the geometry of numbers to solve several problems in cryptanalysis. We use algebraic techniques to cryptanalyze several public key cryptosystems. This paper focuses on RSA and RSA-like schemes, and use tools from the theory of integer lattices to get our results.
Faisal Amir Harahap   +3 more
openaire   +1 more source

A message recovery attack on multivariate polynomial trapdoor function. [PDF]

open access: yesPeerJ Comput Sci, 2023
Ali R   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy