Results 101 to 110 of about 11,187 (236)

Improving GGH Public Key Scheme Using Low Density Lattice Codes [PDF]

open access: yesarXiv, 2015
Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based cryptosystems whose security is based on the hardness of lattice problems. In fact, GGH cryptosystem is the lattice version of the first code-based cryptosystem, proposed by McEliece.
arxiv  

A Matrix Public Key Cryptosystem [PDF]

open access: yesarXiv, 2015
We discuss a matrix public key cryptosystem and its numerical implementation.
arxiv  

How to Break Okamoto’s Cryptosystem by Reducing Lattice Bases [PDF]

open access: bronze, 1988
Brigitte Vallée   +2 more
openalex   +1 more source

Modified Montgomery For Rsa Cryptosystem

open access: yes, 2013
{"references": ["R. Rivest et al., \"A method for obtaining digital signatures and public key cryptosystems,\" Commun. ACM, vol 21, issue 2, Feb 1978, pp. 120-126.", "P.L. Montgomery, \"Modular multiplication without trial division,\" Math Comput, vol 44, Apr. 1985, pp. 519-521.", "C.D. Walter, \"Systolic modular multiplication,\" IEEE Trans.
Rupali Verma, Maitreyee Dutta, Renu Vig
openaire   +4 more sources

The Support Splitting Algorithm for Induced Codes

open access: yesМоделирование и анализ информационных систем, 2018
In the paper, the analysis of the stability of the McEliece-type cryptosystem on induced codes for key attacks is examined. In particular, a model is considered when the automorphism group is trivial for the base code C, on the basis of which the induced
Yury V. Kosolapov, Aleksey N. Shigaev
doaj   +1 more source

Security Notions for Quantum Public-Key Cryptography [PDF]

open access: yesarXiv, 2007
It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology.
arxiv  

An Efficient Hardware-Based Fault-Tolerant Method for SMS4

open access: yesMATEC Web of Conferences, 2018
The SMS4 cryptosystem has been used in the Wireless LAN Authentication and Privacy Infrastructure (WAPI) standard for providing data confidentiality in China. So far, reliability has not been considered a primary objective in original version. However, a
Luo Hanguang, Wen Guangjun, Su Jian
doaj   +1 more source

Home - About - Disclaimer - Privacy