Results 101 to 110 of about 11,187 (236)
Improving GGH Public Key Scheme Using Low Density Lattice Codes [PDF]
Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based cryptosystems whose security is based on the hardness of lattice problems. In fact, GGH cryptosystem is the lattice version of the first code-based cryptosystem, proposed by McEliece.
arxiv
A method for obtaining digital signatures and public-key cryptosystems [PDF]
Ronald L. Rivest+2 more
openalex +1 more source
A Matrix Public Key Cryptosystem [PDF]
We discuss a matrix public key cryptosystem and its numerical implementation.
arxiv
How to Break Okamoto’s Cryptosystem by Reducing Lattice Bases [PDF]
Brigitte Vallée+2 more
openalex +1 more source
Modified Montgomery For Rsa Cryptosystem
{"references": ["R. Rivest et al., \"A method for obtaining digital signatures and public key cryptosystems,\" Commun. ACM, vol 21, issue 2, Feb 1978, pp. 120-126.", "P.L. Montgomery, \"Modular multiplication without trial division,\" Math Comput, vol 44, Apr. 1985, pp. 519-521.", "C.D. Walter, \"Systolic modular multiplication,\" IEEE Trans.
Rupali Verma, Maitreyee Dutta, Renu Vig
openaire +4 more sources
A method for obtaining digital signatures and public-key cryptosystems [PDF]
Ronald L. Rivest+2 more
openalex +1 more source
The Support Splitting Algorithm for Induced Codes
In the paper, the analysis of the stability of the McEliece-type cryptosystem on induced codes for key attacks is examined. In particular, a model is considered when the automorphism group is trivial for the base code C, on the basis of which the induced
Yury V. Kosolapov, Aleksey N. Shigaev
doaj +1 more source
Security Notions for Quantum Public-Key Cryptography [PDF]
It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology.
arxiv
Cryptosystems based on an analog of heat flow [PDF]
G. R. Blakley, William Rundell
openalex +1 more source
An Efficient Hardware-Based Fault-Tolerant Method for SMS4
The SMS4 cryptosystem has been used in the Wireless LAN Authentication and Privacy Infrastructure (WAPI) standard for providing data confidentiality in China. So far, reliability has not been considered a primary objective in original version. However, a
Luo Hanguang, Wen Guangjun, Su Jian
doaj +1 more source