Results 41 to 50 of about 35,576 (230)

A lightweight McEliece cryptosystem co-processor design [PDF]

open access: yes, 2020
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi   +3 more
core   +2 more sources

Elliptic Curve Cryptosystems [PDF]

open access: yesMathematics of Computation, 1987
We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of a finite field. These elliptic curve cryptosystems may be more secure, because the analog of the discrete logarithm problem on elliptic curves is likely to be harder than the classical discrete logarithm problem, especially ...
openaire   +2 more sources

A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication

open access: yesIEEE Access, 2021
In the Internet of Things environment, the secure transmission of digital images has attracted much attention. To improve the confidentiality, we propose an image cryptosystem adopting a quantum chaotic map and the certain security-enhanced mechanisms ...
Heping Wen   +9 more
doaj   +1 more source

Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [PDF]

open access: yesJisuanji kexue, 2021
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem ...
YE Sheng-nan, CHEN Jian-hua
doaj   +1 more source

Cryptanalysis of a computer cryptography scheme based on a filter bank [PDF]

open access: yes, 2007
This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.Comment: 6 ...
Alvarez   +14 more
core   +3 more sources

Cryptanalysis of the CFVZ cryptosystem

open access: yesAdvances in Mathematics of Communications, 2007
The paper analyzes a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an ...
Climent, J J, Gorla, E, Rosenthal, J
openaire   +4 more sources

Energy Efficient Encryption Algorithm for Low Resources Devices

open access: yesARCHive-SR, 2019
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices are connected together to perform a certain task. A well-known example of these structures is the Wireless Sensor Network (WSN).
Bassam W. Aboshosha   +2 more
doaj   +1 more source

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos

open access: yesRemote Sensing, 2020
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing.
Fawad Masood   +6 more
doaj   +1 more source

On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight

open access: yesIEEE Access, 2023
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a
Luca Mariot   +2 more
doaj   +1 more source

A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things

open access: yesIEEE Access, 2023
This paper introduces a novel approach to addressing the security challenges of the Internet of Things (IoT) by presenting a secure Chaos-based lightweight cryptosystem.
Wajih El Hadj Youssef   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy