Results 61 to 70 of about 11,187 (236)

Asymmetric Cryptosystem Using Careful Synchronization [PDF]

open access: yesarXiv, 2023
We present public-private key cryptosystem which utilizes the fact that checking whether a partial automaton is carefully synchronizing is $PSPACE$-complete, even in the case of a binary alphabet.
arxiv  

Implementation Security in Quantum Key Distribution

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 2, February 2025.
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. The present work provides a succint review on this topic, focusing on discrete‐variable QKD setups.
Víctor Zapatero   +2 more
wiley   +1 more source

Analysis of the RSA-cryptosystem in abstract number rings

open access: yesЖурнал Белорусского государственного университета: Математика, информатика, 2020
Quantum computers can be a real threat to some modern cryptosystems (such as the RSA-cryptosystem). The analogue of the RSA-cryptosystem in abstract number rings is not affected by this threat, as there are currently no factorization algorithms using ...
Nikita V. Kondratyonok
doaj   +1 more source

Enabling Quantum Privacy and Security by Design: Imperatives for Contemporary State‐of‐the‐Art in Quantum Software Engineering

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 2, February 2025.
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta   +4 more
wiley   +1 more source

Cryptanalysis of the CLR-cryptosystem [PDF]

open access: yesDesigns, Codes and Cryptography, 2018
In this paper we break a variant of the El-Gamal cryptosystem for a ring action of the matrix space $$E_p^{(m)}$$ on $$\mathbb {Z}/p ...
Micheli, G, Weger, VW
openaire   +2 more sources

Analisys of Lattice-based Public Key Cryptosystems

open access: yesБезопасность информационных технологий, 2011
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj  

The MOR cryptosystem and finite $p$-groups [PDF]

open access: yesarXiv, 2013
The ElGamal cryptosystem is the most widely used public key cryptosystem. It uses the discrete logarithm problem as the cryptographic primitive. The MOR cryptosystem is a similar cryptosystem. It uses the discrete logarithm problem in the automorphism group as the cryptographic primitive.
arxiv  

LightAuth: A Lightweight Sensor Nodes Authentication Framework for Smart Health System

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
ABSTRACT Counterfeit medical devices pose a threat to patient safety, necessitating a secure device authentication system for medical applications. Resource‐constrained sensory nodes are vulnerable to hacking, prompting the need for robust security measures.
Zain Ul Islam Adil   +5 more
wiley   +1 more source

Design and parallel implementation on Artix-7 FPGA of the SIMON32/64 Cryptosystem

open access: yesVisión Electrónica, 2022
In the rise of digital transformation, information security is positioned in a prominent place because it provides confidence to society in the use of information technologies. For this reason, there is growing research in this area.
José Gabriel Rincón-González   +2 more
doaj  

On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystream

open access: yesEURASIP Journal on Advances in Signal Processing, 2017
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with a partial unitary sensing matrix ...
Nam Yul Yu
doaj   +1 more source

Home - About - Disclaimer - Privacy