Many-to-one trapdoor functions and their relation to public-key cryptosystems [PDF]
Mihir Bellare+3 more
openalex +1 more source
On the Effectiveness of a Common Attack to Chebyshev Chaotic Encryption Scheme
Chebyshev polynomials define a rather canonical chaotic cryptosystem and some strong attacks have been designed to that cryptosystem. We report the numerical experiments performed with multiple precision arithmetic using conventional software as gmp and ...
Xiaoqi Liu, Guillermo Morales-Luna
doaj +1 more source
Differential Fault Attacks on Elliptic Curve Cryptosystems [PDF]
Ingrid Biehl+2 more
openalex +1 more source
A Novel Public Key Cryptosystem and Digital Signatures
Saba Inam+3 more
openalex +2 more sources
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform [PDF]
Tatsuaki Okamoto, David Pointcheval
openalex +1 more source
Chosen-Ciphertext Security for Any One-Way Cryptosystem [PDF]
David Pointcheval
openalex +1 more source
Lorenz-based chaotic cryptosystem: a monolithic implementation [PDF]
O.A. Gonzales+3 more
openalex +1 more source
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders [PDF]
Detlef Hühnlein
openalex +1 more source
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Rosario Gennaro+3 more
openalex +1 more source
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract) [PDF]
Detlef Hühnlein+2 more
openalex +1 more source