Results 61 to 70 of about 11,187 (236)
Asymmetric Cryptosystem Using Careful Synchronization [PDF]
We present public-private key cryptosystem which utilizes the fact that checking whether a partial automaton is carefully synchronizing is $PSPACE$-complete, even in the case of a binary alphabet.
arxiv
Implementation Security in Quantum Key Distribution
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. The present work provides a succint review on this topic, focusing on discrete‐variable QKD setups.
Víctor Zapatero+2 more
wiley +1 more source
Analysis of the RSA-cryptosystem in abstract number rings
Quantum computers can be a real threat to some modern cryptosystems (such as the RSA-cryptosystem). The analogue of the RSA-cryptosystem in abstract number rings is not affected by this threat, as there are currently no factorization algorithms using ...
Nikita V. Kondratyonok
doaj +1 more source
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta+4 more
wiley +1 more source
Cryptanalysis of the CLR-cryptosystem [PDF]
In this paper we break a variant of the El-Gamal cryptosystem for a ring action of the matrix space $$E_p^{(m)}$$ on $$\mathbb {Z}/p ...
Micheli, G, Weger, VW
openaire +2 more sources
Analisys of Lattice-based Public Key Cryptosystems
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj
The MOR cryptosystem and finite $p$-groups [PDF]
The ElGamal cryptosystem is the most widely used public key cryptosystem. It uses the discrete logarithm problem as the cryptographic primitive. The MOR cryptosystem is a similar cryptosystem. It uses the discrete logarithm problem in the automorphism group as the cryptographic primitive.
arxiv
LightAuth: A Lightweight Sensor Nodes Authentication Framework for Smart Health System
ABSTRACT Counterfeit medical devices pose a threat to patient safety, necessitating a secure device authentication system for medical applications. Resource‐constrained sensory nodes are vulnerable to hacking, prompting the need for robust security measures.
Zain Ul Islam Adil+5 more
wiley +1 more source
Design and parallel implementation on Artix-7 FPGA of the SIMON32/64 Cryptosystem
In the rise of digital transformation, information security is positioned in a prominent place because it provides confidence to society in the use of information technologies. For this reason, there is growing research in this area.
José Gabriel Rincón-González+2 more
doaj
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with a partial unitary sensing matrix ...
Nam Yul Yu
doaj +1 more source