Results 121 to 130 of about 380,993 (266)
MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The
A. Beletsky, D. Stecenko
doaj
A Quantum Approach for Reducing Communications in Classical Cryptographic Primitives
Jiayu Zhang
openalex +2 more sources
Secure and Computationally Efficient Cryptographic Primitive Based on Cellular Automaton [PDF]
Rade Vuckovac
openalex +1 more source
The least primitive roots mod p
Let p>1p\gt 1 be a large prime number, and let ε>0\varepsilon \gt 0 be a small number. The established unconditional upper bounds of the least primitive root u≠±1,v2u\ne \pm 1,{v}^{2} in the prime finite field Fp{{\mathbb{F}}}_{p} have exponential ...
Carella Nelson
doaj +1 more source
A Universally Composable Linkable Ring Signature Supporting Stealth Addresses
The linkable ring signature supporting stealth addresses (SALRS) is a recently proposed cryptographic primitive, which is designed to comprehensively address the soundness and privacy requirements associated with concealing the identities of both the ...
Xingkai Wang, Chunping Zhu, Zhen Liu
doaj +1 more source
87th Annual Meeting of the Meteoritical Society 2025: Abstracts
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley +1 more source
A new semiring and its cryptographic applications
This paper introduced a novel semiring structure involving nonnegative integers, where operations depended on the comparison of the magnitudes of decimal digit sums.
Huawei Huang +3 more
doaj +1 more source
Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechanisms
Eskeland Sigurd
doaj +1 more source

