Results 81 to 90 of about 37,139 (180)

Asymmetric Cryptosystem Using Improved Equal Modulus Decomposition in Cylindrical Diffraction Domain

open access: yesIEEE Access, 2019
We present a simple and efficient asymmetric cryptosystem using an improved equal modulus decomposition (EMD) in the cylindrical diffraction domain. Being different from a cryptosystem based on the conventional EMD, whose outputs are complex-valued, in ...
Jun Wang   +4 more
doaj   +1 more source

On non-abelian homomorphic public-key cryptosystems

open access: yes, 2002
An important problem of modern cryptography concerns secret public-key computations in algebraic structures. We construct homomorphic cryptosystems being (secret) epimorphisms f:G --> H, where G, H are (publically known) groups and H is finite.
Grigoriev, D., Ponomarenko, I.
core   +3 more sources

Features of Structural Hardware Transformation of Information in Cryptosystems

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники
The article considers types, functions and some features of cryptosystems, as well as circuit design options for expanding their functionality. Options for generating keys and ciphers used in cryptosystems with a typical structural organization, and ...
A. F. Chernyavskiy   +2 more
doaj   +1 more source

Assessing security of some group based cryptosystems

open access: yes, 2003
One of the possible generalizations of the discrete logarithm problem to arbitrary groups is the so-called conjugacy search problem (sometimes erroneously called just the conjugacy problem): given two elements a, b of a group G and the information that a^
Shpilrain, Vladimir
core   +1 more source

Using Modified Gorti-enhanced Homomorphic Cryptosystem to Improve Security of ECG Signal

open access: yesJournal of Telecommunications and Information Technology
While offering vast data storage capabilities, cloud computing poses numerous security- and privacy-related challenges. This requires robust security measures, particularly for sensitive data, such as electrocardiograms (ECG). Homomorphic encryption (HE)
Fatma Zohra Besmi   +2 more
doaj   +1 more source

Public-key cryptography and invariant theory

open access: yes, 2002
Public-key cryptosystems are suggested based on invariants of groups.
Grigoriev, D.
core   +1 more source

AN IDEA FOR KNAPSACK CRYPTOSYSTEM BACKDOOR

open access: yesБезопасность информационных технологий
There are practically no known backdoors in a knapsack cryptosystem, the security of which is based on the difficulty of solving the knapsack packing problem.
Mikhail A. Ivanov
doaj   +1 more source

Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems

open access: green, 2021
Marco Baldi   +4 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy