Results 61 to 70 of about 1,761 (191)
Depth Optimization of FLT-Based Quantum Inversion Circuit
Works on quantum computing and cryptanalysis have increased significantly in the past few years. Various constructions of quantum arithmetic circuits as one of the primary elements in the field have also been proposed. However, there have only been a few
Harashta Tatimma Larasati +4 more
doaj +1 more source
A Secure Way of Communication for Smart Grid Networks
In 2021, Khan et al. suggested a scheme based on smart grid networks. They deployed the random oracle model to justify the security of their scheme formally. They also verified the security of the scheme using the AVISPA software tool. We studied this scheme and found some security issues. The scheme suffers from a confidentiality breach attack.
Pooja Tyagi +4 more
wiley +1 more source
A Certificateless Verifiable Strong Designated Verifier Signature Scheme
Certificateless strong designated verifier signature schemes have realized the merit of CL-PKC against the traditional strong designated verifier signatures.
Shu Han +8 more
doaj +1 more source
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj +1 more source
Lazy Random Walk Efficient for Pollard’s Rho Method Attacking on G3 over Barreto-Naehrig Curve (Corrected) [PDF]
Pairing–based cryptosystems are well implemented with Ate–type pairing over Barreto–Naehrig (BN) curve. Then, for instance, their securities depend on the difficulty of Discrete Logarithm Problem (DLP) on the so–denoted G3 over BN curve.
Nekado, Kenta +2 more
core +1 more source
A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang +5 more
wiley +1 more source
Constructing cluster of simple FPGA boards for cryptologic computations [PDF]
In this paper, we propose an FPGA cluster infrastructure, which can be utilized in implementing cryptanalytic attacks and accelerating cryptographic operations.
Doroz, Yarkin +3 more
core +1 more source
Multi‐hop anonymous payment channel network based on onion routing
To solve the payment channel network path privacy problem, we analyse the multi‐hop anonymous and privacy‐preserving payment channel network scheme and propose a multi‐hop anonymous payment channel network based on onion routing based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing‐based payment ...
Caimei Wang, Yudong Ren, Zhize Wu
wiley +1 more source
Approach to pairing inversions without solving Miller inversion [PDF]
In the present paper, we show that the pairinginversion problem of Atei pairing can be solved under theassumption that we have a generic algorithm for solving “exponentiationinversion” problem. With such an algorithm, theinversion problem of Atei pairing
Kanayama Naoki +3 more
core +1 more source
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li +3 more
wiley +1 more source

