Results 81 to 90 of about 59,589 (271)

Perfect secrecy cryptosystem with nonuniform distribution of keys

open access: yesTongxin xuebao, 2018
More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its ...
Chuanjun TIAN
doaj   +2 more sources

An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment

open access: yesComplex, 2019
Surveillance systems paradigm envisions the pervasive interconnection and cooperation of interactive devices over the Internet infrastructure. Nevertheless, dissemination and processing of surveillance video amid the Internet of Things (IoT) applications
Rafik Hamza   +4 more
semanticscholar   +1 more source

Cryptanalysis of the CLR-cryptosystem [PDF]

open access: yesDesigns, Codes and Cryptography, 2018
In this paper we break a variant of the El-Gamal cryptosystem for a ring action of the matrix space $$E_p^{(m)}$$ on $$\mathbb {Z}/p ...
Micheli, G, Weger, VW
openaire   +2 more sources

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Analisys of Lattice-based Public Key Cryptosystems

open access: yesБезопасность информационных технологий, 2011
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj  

RSA: A number of formulas to improve the search for p+qp+q

open access: yesJournal of Mathematical Cryptology, 2017
Breaking RSA is one of the fundamental problems in cryptography. Due to its reliance on the difficulty of the integer factorization problem, no efficient solution has been found despite decades of extensive research. One of the possible ways to break RSA
Mohammed Ahmed, Alkhelaifi Abdulrahman
doaj   +1 more source

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 5, May 2025.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem

open access: yesIEEE Access, 2018
With the increasing use of media in communications, the content security of digital images attracts much attention in both the academia and the industry.
Xiaoqiang Zhang, X. Wang
semanticscholar   +1 more source

Analysis of the RSA-cryptosystem in abstract number rings

open access: yesЖурнал Белорусского государственного университета: Математика, информатика, 2020
Quantum computers can be a real threat to some modern cryptosystems (such as the RSA-cryptosystem). The analogue of the RSA-cryptosystem in abstract number rings is not affected by this threat, as there are currently no factorization algorithms using ...
Nikita V. Kondratyonok
doaj   +1 more source

Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes

open access: yes, 2013
We consider the framework of the McEliece cryptosystem based on LDPC codes, which is a promising post-quantum alternative to classical public key cryptosystems.
Baldi, Marco   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy