Results 11 to 20 of about 11,187 (236)

Spline cryptosystem [PDF]

open access: bronzeACM SIGSAC Review, 1992
The Spline Cryptosystem has succeeded two major achievements: First, the system is based on real arithmetic which is generally considered unapplicable to cryptography because the information is lost through round-off errors.
Chien-Hao Ho, Qiwo Xuan, Fengi Hwu
openalex   +3 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

T‐depth reduction method for efficient SHA‐256 quantum circuit construction

open access: yesIET Information Security, Volume 17, Issue 1, Page 46-65, January 2023., 2023
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic algorithm is essential, especially in terms of quantum security analysis, and it is well known that T‐depth
Jongheon Lee   +3 more
wiley   +1 more source

Improved lattice enumeration algorithms by primal and dual reordering methods

open access: yesIET Information Security, Volume 17, Issue 1, Page 35-45, January 2023., 2023
Abstract The security of lattice‐based cryptosystems is generally based on the hardness of the Shortest Vector Problem (SVP). The original enumeration (ENUM) algorithm solving SVP runs in exponential time due to the exhaustive search, which is used as a subroutine for the block Korkin–Zolotarev (BKZ) algorithm.
Kazuki Yamamura   +2 more
wiley   +1 more source

Cubicle: A family of space‐hard ciphers for IoT

open access: yesIET Information Security, Volume 17, Issue 1, Page 131-146, January 2023., 2023
Abstract As IoT has increasingly evolved in recent years, it has become more important to ensure security on IoT devices. Many of such devices are under the threat of attacks in the beyond black‐box model. To protect from the threat, the cryptographic implementation that can offer secure execution in the grey‐/white‐box model is important.
Rentaro Shiba   +3 more
wiley   +1 more source

On the Performance of Hyperelliptic Cryptosystems [PDF]

open access: bronze, 1999
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to generate suitable curves for use in cryptography. This paper presents a practical comparison between the performance of elliptic curve based digital signature schemes and schemes ...
Nigel P. Smart
openalex   +3 more sources

Improved integral cryptanalysis of SPNbox in digital rights management systems

open access: yesIET Information Security, Volume 17, Issue 1, Page 147-158, January 2023., 2023
Abstract As an access control technology of digital material, digital rights management systems have a profound effect on the copyright protection of digital content. To address the threat of key exposure, applying white‐box ciphers is effective to provide a security guarantee for digital rights management systems.
Jun Liu   +4 more
wiley   +1 more source

The Rabin cryptosystem revisited [PDF]

open access: yesApplicable Algebra in Engineering, Communication and Computing, 2014
minor review + introduction of a deterministic scheme using quartic reciprocity that works for primes congruent 5 modulo ...
Elia, Michele   +2 more
openaire   +2 more sources

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]

open access: yesEngineering and Technology Journal, 2010
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy