Results 41 to 50 of about 35,576 (230)
A lightweight McEliece cryptosystem co-processor design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi+3 more
core +2 more sources
Elliptic Curve Cryptosystems [PDF]
We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of a finite field. These elliptic curve cryptosystems may be more secure, because the analog of the discrete logarithm problem on elliptic curves is likely to be harder than the classical discrete logarithm problem, especially ...
openaire +2 more sources
A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication
In the Internet of Things environment, the secure transmission of digital images has attracted much attention. To improve the confidentiality, we propose an image cryptosystem adopting a quantum chaotic map and the certain security-enhanced mechanisms ...
Heping Wen+9 more
doaj +1 more source
Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [PDF]
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem ...
YE Sheng-nan, CHEN Jian-hua
doaj +1 more source
Cryptanalysis of a computer cryptography scheme based on a filter bank [PDF]
This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.Comment: 6 ...
Alvarez+14 more
core +3 more sources
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an ...
Climent, J J, Gorla, E, Rosenthal, J
openaire +4 more sources
Energy Efficient Encryption Algorithm for Low Resources Devices
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices are connected together to perform a certain task. A well-known example of these structures is the Wireless Sensor Network (WSN).
Bassam W. Aboshosha+2 more
doaj +1 more source
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing.
Fawad Masood+6 more
doaj +1 more source
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a
Luca Mariot+2 more
doaj +1 more source
A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things
This paper introduces a novel approach to addressing the security challenges of the Internet of Things (IoT) by presenting a secure Chaos-based lightweight cryptosystem.
Wajih El Hadj Youssef+8 more
doaj +1 more source