Results 221 to 230 of about 11,187 (236)
Some of the next articles are maybe not open access.

Cryptanalysis of the GGH Cryptosystem

Mathematics in Computer Science, 2010
In this correspondence, we show that partial information of plaintext can be used to simplify the decryption problem in the case of the GGH cryptosystem. Combined with Nguyen’s previous attack, we solve the numerical GGH challenge of the highest dimension 400, proposed on the Internet by the authors of the cryptosystem.
Lee, M.S., Hahn, S.G. Hahn, Sang-Geun
openaire   +2 more sources

The RSA Cryptosystem

2010
After Whitfield Diffie and Martin Hellman introduced public-key cryptography in their landmark 1976 paper [58], a new branch of cryptography suddenly opened up. As a consequence, cryptologists started looking for methods with which public-key encryption could be realized. In 1977, Ronald Rivest, Adi Shamir and Leonard Adleman (cf. Fig.
Christof Paar, Jan Pelzl
openaire   +2 more sources

The RSA Cryptosystem

2018
So, we now understand one pretty secure modern cryptosystem, namely ElGamal. Is this the end of the story? Actually, it’s not. One disadvantage of ElGamal is that it makes the message twice as long, since Bob has to send two numbers when he only wants to encrypt one. So this is a bit inefficient.
openaire   +2 more sources

An evaluation methodology for the security of cryptosystems

2008 Ph.D. Research in Microelectronics and Electronics, 2008
This paper describes an integrated circuit design methodology which evaluates at the gate level the resistance of the circuit to a class of attacks, among them is the well-known Differential Power Analysis (DPA). This is of particular concern since it enables the designer to detect design strengths and weaknesses and to compare and choose different ...
Laabidi, Selma   +2 more
openaire   +3 more sources

Why cryptosystems fail [PDF]

open access: possibleCommunications of the ACM, 1993
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionally been government agencies, which are very secretive about their mistakes.In this article, we present the results of a survey of the failure modes of retail banking systems ...
openaire   +1 more source

Cryptanalysis of the Hidden Matrix Cryptosystem

2010
In this paper, we present an efficient cryptanalysis of the so-called HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, this scheme was exempt from cryptanalysis. We first present a distinguisher which uses a differential property of the public key.
Faugère, Jean-Charles   +3 more
openaire   +4 more sources

An implementation of the McEliece-cryptosystem

ACM SIGSAC Review, 1991
Most asymmetric cryptosystems are based on hard number-theoretic problems such as integer factorization or taking discrete logarithms in finite groups [2]. Their performance aspect are well investigated [3].
openaire   +3 more sources

Other Bases of Cryptosystems

1990
The framework presented in Section 2.2 for the construction of public-key cryptosystems is very general. Indeed, the area or subject matter of the underlying problem is not specified in any way. Any one-way street could be worth a try, and many streets have actually been tried.
openaire   +2 more sources

Home - About - Disclaimer - Privacy