Results 61 to 70 of about 1,761 (191)

Depth Optimization of FLT-Based Quantum Inversion Circuit

open access: yesIEEE Access, 2023
Works on quantum computing and cryptanalysis have increased significantly in the past few years. Various constructions of quantum arithmetic circuits as one of the primary elements in the field have also been proposed. However, there have only been a few
Harashta Tatimma Larasati   +4 more
doaj   +1 more source

A Secure Way of Communication for Smart Grid Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2025, Issue 1, 2025.
In 2021, Khan et al. suggested a scheme based on smart grid networks. They deployed the random oracle model to justify the security of their scheme formally. They also verified the security of the scheme using the AVISPA software tool. We studied this scheme and found some security issues. The scheme suffers from a confidentiality breach attack.
Pooja Tyagi   +4 more
wiley   +1 more source

A Certificateless Verifiable Strong Designated Verifier Signature Scheme

open access: yesIEEE Access, 2019
Certificateless strong designated verifier signature schemes have realized the merit of CL-PKC against the traditional strong designated verifier signatures.
Shu Han   +8 more
doaj   +1 more source

Efficient Pairing-Free Attribute-Based Blind Signature Scheme Based on Ordered Binary Decision Diagram

open access: yesIEEE Access, 2022
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj   +1 more source

Lazy Random Walk Efficient for Pollard’s Rho Method Attacking on G3 over Barreto-Naehrig Curve (Corrected) [PDF]

open access: yes, 2013
Pairing–based cryptosystems are well implemented with Ate–type pairing over Barreto–Naehrig (BN) curve. Then, for instance, their securities depend on the difficulty of Discrete Logarithm Problem (DLP) on the so–denoted G3 over BN curve.
Nekado, Kenta   +2 more
core   +1 more source

A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang   +5 more
wiley   +1 more source

Constructing cluster of simple FPGA boards for cryptologic computations [PDF]

open access: yes, 2012
In this paper, we propose an FPGA cluster infrastructure, which can be utilized in implementing cryptanalytic attacks and accelerating cryptographic operations.
Doroz, Yarkin   +3 more
core   +1 more source

Multi‐hop anonymous payment channel network based on onion routing

open access: yesIET Blockchain, Volume 4, Issue 2, Page 197-208, June 2024.
To solve the payment channel network path privacy problem, we analyse the multi‐hop anonymous and privacy‐preserving payment channel network scheme and propose a multi‐hop anonymous payment channel network based on onion routing based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing‐based payment ...
Caimei Wang, Yudong Ren, Zhize Wu
wiley   +1 more source

Approach to pairing inversions without solving Miller inversion [PDF]

open access: yes, 2012
In the present paper, we show that the pairinginversion problem of Atei pairing can be solved under theassumption that we have a generic algorithm for solving “exponentiationinversion” problem. With such an algorithm, theinversion problem of Atei pairing
Kanayama Naoki   +3 more
core   +1 more source

A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy