Results 91 to 100 of about 37,139 (180)
Lattice‐based cryptosystems in standardisation processes: A survey [PDF]
Anyu Wang, Dianyan Xiao, Yang Yu
openalex +1 more source
Public key cryptosystem based on algebraic geometric codes
A public-key cryptosystem based on algebraic geometric codes was proposed.The cryptosystem is a pub-lic-key system combined with error correcting.Compared with M public-key system and some variants,the performance of the public-key cryptosystem was ...
ZHANG Ying, YUE Dian-wu
doaj +2 more sources
A Public-Key Cryptosystem Using Cyclotomic Matrices [PDF]
Md. Helal Ahmed +2 more
openalex +1 more source
A Comparative Study on Various Techniques Related to Fingerprint Based Biometric Cryptosystems
Mutya Sirisha Adapa +1 more
openalex +1 more source
SoK: Fault Injection Attacks on Cryptosystems [PDF]
Tinghung Chiu, Wenjie Xiong
openalex +1 more source
On the Effectiveness of a Common Attack to Chebyshev Chaotic Encryption Scheme
Chebyshev polynomials define a rather canonical chaotic cryptosystem and some strong attacks have been designed to that cryptosystem. We report the numerical experiments performed with multiple precision arithmetic using conventional software as gmp and ...
Xiaoqi Liu, Guillermo Morales-Luna
doaj +1 more source
A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes [PDF]
Julian Danner, Martin Kreuzer
openalex +1 more source
Differential-like Chosen Cipher Attack on A Spatiotemporally Chaotic Cryptosystem [PDF]
Jiantao Zhou +4 more
openalex +1 more source
Faster cellular automata cryptosystems with neighbor sequences
Kittiphop Phalakarn +18 more
openalex +1 more source
Efficient Chaotic Tent Map-based Image Cryptosystem
Abdulmalik Danlami Mohammed, Syed Osama
openalex +1 more source

