Results 81 to 90 of about 59,589 (271)
Perfect secrecy cryptosystem with nonuniform distribution of keys
More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its ...
Chuanjun TIAN
doaj +2 more sources
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment
Surveillance systems paradigm envisions the pervasive interconnection and cooperation of interactive devices over the Internet infrastructure. Nevertheless, dissemination and processing of surveillance video amid the Internet of Things (IoT) applications
Rafik Hamza+4 more
semanticscholar +1 more source
Cryptanalysis of the CLR-cryptosystem [PDF]
In this paper we break a variant of the El-Gamal cryptosystem for a ring action of the matrix space $$E_p^{(m)}$$ on $$\mathbb {Z}/p ...
Micheli, G, Weger, VW
openaire +2 more sources
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci+7 more
wiley +1 more source
Analisys of Lattice-based Public Key Cryptosystems
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj
RSA: A number of formulas to improve the search for p+qp+q
Breaking RSA is one of the fundamental problems in cryptography. Due to its reliance on the difficulty of the integer factorization problem, no efficient solution has been found despite decades of extensive research. One of the possible ways to break RSA
Mohammed Ahmed, Alkhelaifi Abdulrahman
doaj +1 more source
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma+3 more
wiley +1 more source
Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem
With the increasing use of media in communications, the content security of digital images attracts much attention in both the academia and the industry.
Xiaoqiang Zhang, X. Wang
semanticscholar +1 more source
Analysis of the RSA-cryptosystem in abstract number rings
Quantum computers can be a real threat to some modern cryptosystems (such as the RSA-cryptosystem). The analogue of the RSA-cryptosystem in abstract number rings is not affected by this threat, as there are currently no factorization algorithms using ...
Nikita V. Kondratyonok
doaj +1 more source
Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes
We consider the framework of the McEliece cryptosystem based on LDPC codes, which is a promising post-quantum alternative to classical public key cryptosystems.
Baldi, Marco+3 more
core +1 more source