Results 31 to 40 of about 11,187 (236)

Generalized Fibonacci Sequences for Elliptic Curve Cryptography

open access: yesMathematics, 2023
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves.
Zakariae Cheddour   +2 more
doaj   +1 more source

Group ring based public key cryptosystems [PDF]

open access: yesJournal of Discrete Mathematical Sciences and Cryptography, 2021, 2019
In this paper, we propose two cryptosystems based on group rings and existing cryptosystem. First one is Elliptic ElGamal type group ring public key cryptosystem whose security is greater than security of cryptosystems based on elliptic curves discrete logarithmic problem (ECDLP).
arxiv   +1 more source

CRYPTANALYSIS OF HYBRID CRYPTOSYSTEMS [PDF]

open access: yesInternational Journal of Bifurcation and Chaos, 2013
An essential issue for the validation of ciphers is cryptanalysis, that is, the study of attacks in order to reveal possible weaknesses. In this paper, we propose a systematic and unified methodology for cryptanalyzing known chaos-based cryptosystems borrowed from the open literature, namely shift keying, discrete parameter modulation, switched ...
openaire   +4 more sources

Models of interaction of cryptography and chaotic dynamics

open access: yesҚарағанды университетінің хабаршысы. Математика сериясы, 2019
Cryptography deals with the problem of information protection by its transformation, providing the protection of information (by means of computational techniques), i.e. a set of agreed encryptian tools.
B.K. Shayakhmetova   +3 more
doaj   +1 more source

Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [PDF]

open access: yesJisuanji kexue, 2021
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem ...
YE Sheng-nan, CHEN Jian-hua
doaj   +1 more source

Security Analysis of DBTRU Cryptosystem. [PDF]

open access: yesEntropy (Basel), 2022
DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings GF(2)[x]/(xn+1). DBTRU has some advantages over NTRU in terms of security and performance. In this paper, we propose a polynomial-time linear algebra attack against the DBTRU cryptosystem, which can break ...
Tong X, Bi J, Duan Y, Li L, Wang L.
europepmc   +4 more sources

A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication

open access: yesIEEE Access, 2021
In the Internet of Things environment, the secure transmission of digital images has attracted much attention. To improve the confidentiality, we propose an image cryptosystem adopting a quantum chaotic map and the certain security-enhanced mechanisms ...
Heping Wen   +9 more
doaj   +1 more source

Cryptanalysis of the CFVZ cryptosystem

open access: yesAdvances in Mathematics of Communications, 2007
The paper analyzes a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an ...
Climent, J J, Gorla, E, Rosenthal, J
openaire   +4 more sources

On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight

open access: yesIEEE Access, 2023
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a
Luca Mariot   +2 more
doaj   +1 more source

A McEliece cryptosystem using permutation codes [PDF]

open access: yesarXiv, 2021
This paper is an attempt to build a new public-key cryptosystem; similar to the McEliece cryptosystem, using permutation error-correcting codes. We study a public-key cryptosystem built using two permutation error-correcting codes. We show that these cryptosystems are insecure.
arxiv  

Home - About - Disclaimer - Privacy