Results 121 to 130 of about 59,589 (271)
A method for obtaining digital signatures and public-key cryptosystems [PDF]
Ronald L. Rivest+2 more
openalex +1 more source
A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding
Chaotic maps have good potential in security applications due to their inherent characteristics relevant to cryptography. This paper introduces a new audio cryptosystem based on chaotic maps, hybrid chaotic shift transform (HCST), and deoxyribonucleic ...
S. Sheela, K. Suresh, D. Tandur
semanticscholar +1 more source
Advances in Homomorphic Cryptosystems
JUCS - Journal of Universal Computer Science Volume Nr.
openaire +2 more sources
A method for obtaining digital signatures and public-key cryptosystems [PDF]
Ronald L. Rivest+2 more
openalex +1 more source
Cryptanalysis of Liaw's broadcasting Cryptosystem
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yuh-Min Tseng, Jinn-Ke Jan
openaire +3 more sources
Modified Montgomery For Rsa Cryptosystem
{"references": ["R. Rivest et al., \"A method for obtaining digital signatures and public key cryptosystems,\" Commun. ACM, vol 21, issue 2, Feb 1978, pp. 120-126.", "P.L. Montgomery, \"Modular multiplication without trial division,\" Math Comput, vol 44, Apr. 1985, pp. 519-521.", "C.D. Walter, \"Systolic modular multiplication,\" IEEE Trans.
Rupali Verma, Maitreyee Dutta, Renu Vig
openaire +4 more sources
Considerations for rank-based cryptosystems
Cryptosystems based on rank metric codes have been considered as an alternative to McEliece cryptosystems due to the relative difficulty of solving the rank syndrome decoding problem. Generic attacks have recently seen several improvements, notably in the work of Gaborit et al., who give an improved algorithm using linearized polynomials which yields a
Horlemann-Trautmann Anna-Lena+2 more
openaire +4 more sources
The remarkably long-standing problem of cryptography is to generate completely secure key. It is widely believed that the task cannot be achieved within classical cryptography. However, there is no proof in support of this belief. We present an incredibly simple classical cryptosystem which can generate completely secure key.
openaire +2 more sources
A privacy-preserving cryptosystem for IoT E-healthcare
Rafik Hamza+4 more
semanticscholar +1 more source
Cryptanalysis of the Ajtai-Dwork cryptosystem [PDF]
P.H. Nguyen, Jacques Stern
openalex +1 more source