Results 81 to 90 of about 37,139 (180)
Asymmetric Cryptosystem Using Improved Equal Modulus Decomposition in Cylindrical Diffraction Domain
We present a simple and efficient asymmetric cryptosystem using an improved equal modulus decomposition (EMD) in the cylindrical diffraction domain. Being different from a cryptosystem based on the conventional EMD, whose outputs are complex-valued, in ...
Jun Wang +4 more
doaj +1 more source
On non-abelian homomorphic public-key cryptosystems
An important problem of modern cryptography concerns secret public-key computations in algebraic structures. We construct homomorphic cryptosystems being (secret) epimorphisms f:G --> H, where G, H are (publically known) groups and H is finite.
Grigoriev, D., Ponomarenko, I.
core +3 more sources
Features of Structural Hardware Transformation of Information in Cryptosystems
The article considers types, functions and some features of cryptosystems, as well as circuit design options for expanding their functionality. Options for generating keys and ciphers used in cryptosystems with a typical structural organization, and ...
A. F. Chernyavskiy +2 more
doaj +1 more source
An Elliptic Curve Cryptosystem based on Trust and RBAC to Reduce Security Overhead in Sensor Networks [PDF]
Hyojin Kim, Ho Hyun Park
openalex +1 more source
Assessing security of some group based cryptosystems
One of the possible generalizations of the discrete logarithm problem to arbitrary groups is the so-called conjugacy search problem (sometimes erroneously called just the conjugacy problem): given two elements a, b of a group G and the information that a^
Shpilrain, Vladimir
core +1 more source
Using Modified Gorti-enhanced Homomorphic Cryptosystem to Improve Security of ECG Signal
While offering vast data storage capabilities, cloud computing poses numerous security- and privacy-related challenges. This requires robust security measures, particularly for sensitive data, such as electrocardiograms (ECG). Homomorphic encryption (HE)
Fatma Zohra Besmi +2 more
doaj +1 more source
Public-key cryptography and invariant theory
Public-key cryptosystems are suggested based on invariants of groups.
Grigoriev, D.
core +1 more source
A Family of Jacobians Suitable for Discrete Log Cryptosystems [PDF]
Neal Koblitz
openalex +1 more source
AN IDEA FOR KNAPSACK CRYPTOSYSTEM BACKDOOR
There are practically no known backdoors in a knapsack cryptosystem, the security of which is based on the difficulty of solving the knapsack packing problem.
Mikhail A. Ivanov
doaj +1 more source

