Results 111 to 120 of about 59,589 (271)

Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm

open access: yesIEEE Photonics Journal, 2019
In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the ...
Yi Xiong, Ravi Kumar, Chenggen Quan
doaj   +1 more source

Cryptosystem Based on Induced Group Codes

open access: yesМоделирование и анализ информационных систем, 2016
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj   +1 more source

Homomorphic public-key cryptosystems and encrypting boolean circuits

open access: yes, 2003
In this paper homomorphic cryptosystems are designed for the first time over any finite group. Applying Barrington's construction we produce for any boolean circuit of the logarithmic depth its encrypted simulation of a polynomial size over an ...
Grigoriev, Dima, Ponomarenko, Ilia
core   +1 more source

A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers

open access: yes, 2018
Cryptography is the study that provides security service. It concerns with confidentiality, integrity, and authentication. Public key cryptography provides an enormous revolution in the field of the cryptosystem. It uses two different keys where keys are
Muhammad Ariful Islam   +3 more
semanticscholar   +1 more source

Hidden Polynomial(s) Cryptosystems

open access: yes, 2003
We propose variations of the class of hidden monomial cryptosystems in order to make it resistant to all known attacks. We use identities built upon a single bivariate polynomial equation with coefficients in a finite field. Indeed, it can be replaced by a ``small'' ideal, as well. Throughout, we set up probabilistic encryption protocols, too. The same
openaire   +3 more sources

Asymmetric Color Image Cryptosystem Using Detour Cylindrical-Diffraction and Phase Reservation & Truncation

open access: yesIEEE Access, 2018
Recently, color image encryption has attracted extensive research interests. However, challenging issues, such as linearity, complex-valued output, and information disclosure, remain.
Jun Wang, Qiong-Hua Wang, Yuhen Hu
doaj   +1 more source

A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes

open access: yes, 2012
Baldi et \textit{al.} proposed a variant of McEliece's cryptosystem. The main idea is to replace its permutation matrix by adding to it a rank 1 matrix.
Gauthier, Valérie   +2 more
core   +1 more source

Asymmetric Cryptosystem Using Improved Equal Modulus Decomposition in Cylindrical Diffraction Domain

open access: yesIEEE Access, 2019
We present a simple and efficient asymmetric cryptosystem using an improved equal modulus decomposition (EMD) in the cylindrical diffraction domain. Being different from a cryptosystem based on the conventional EMD, whose outputs are complex-valued, in ...
Jun Wang   +4 more
doaj   +1 more source

Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium

open access: yesScientific Reports, 2017
Security analysis is important and necessary for a new cryptosystem. In this paper, we evaluate the security risk of the optical cryptosystem with spatially incoherent illumination from the view of imaging through scattering medium and then demonstrate ...
Meihua Liao   +3 more
semanticscholar   +1 more source

The Beta Cryptosystem

open access: yesBulletin of Electrical Engineering and Informatics, 2015
This paper, we introduce mainly the concept of beta cryptosystem, whose security is based on generalized discrete logarithm problem and integer factorization problem in the multiplicative group of finite fields. We show that the proposed public key cryptosystem based on generalized discrete logarithm problem and integer factorization problem, provides ...
openaire   +3 more sources

Home - About - Disclaimer - Privacy