Results 31 to 40 of about 1,784 (149)

Secure data storage and access for fish monitoring in cloud environment

open access: yesMeasurement: Sensors, 2023
Cloud computing (CC) refers to the on-demand availability of computer system resources, specifically data storage and computational power, without the user's direct active administration.
K.S. Saraswathy, S.S. Sujatha
doaj   +1 more source

Enhanced NTRU cryptosystem eliminating decryption failures

open access: yesJournal of Systems Engineering and Electronics, 2006
Summary: An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model and chosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reduction algorithms are analyzed to evaluate the security of this scheme.
Yao, Jun, Zeng, Guihua
openaire   +1 more source

A general construction for monoid-based knapsack protocols [PDF]

open access: yes, 2014
We present a generalized version of the knapsack protocol proposed by D. Naccache and J. Stern at the Proceedings of Eurocrypt (1997). Our new framework will allow the construction of other knapsack protocols having similar security features.
Micheli, Giacomo, Schiavina, Michele
core   +1 more source

A New Provably Secure Cryptosystem Using Dedekind Domain Direct Product Approach

open access: yesRatio Mathematica, 2018
We would like to prevent, detect, and protect communication and information systems' attacks, which include unauthorized reading of a message of file and traffic analysis or active attacks, such as modification of messages or files, and denial of service
Amir Hassani Karbasi
doaj   +1 more source

A Non-commutative Cryptosystem Based on Quaternion Algebras

open access: yes, 2017
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosystem uses bivariate polynomials as the underling ring.
Bagheri, Khadijeh   +2 more
core   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

A framework for cryptographic problems from linear algebra

open access: yesJournal of Mathematical Cryptology, 2020
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl   +3 more
doaj   +1 more source

Cryptographic applications of sparse polynomials over finite rings [PDF]

open access: yes, 2001
This is a preprint of a book chapter published in Lecture Notes in Computer Science, 2015, Springer-Verlag, Berlin (2001). The original publication is available at www.springerlink.com.This paper gives new examples that exploit the idea of using sparse ...
Banks, William David, 1964-   +3 more
core   +1 more source

On the distribution of Low Hamming Weight products

open access: yesJournal of Inequalities and Applications, 2020
Jeffrey Hoffstein et al. (Discrete Appl. Math. 130:37–49, 2003) introduced the Low Hamming Weight products (LHWP) X = x 1 x 2 x 3 $X=x_{1}x_{2}x_{3}$ as random exponent of elements in a group or a ring to improve the operational efficiency, where each x ...
Jianghua Li, Qiao Li
doaj   +1 more source

Application of NTRU Cryptographic Algorithm for securing SCADA communication

open access: yes, 2013
Supervisory Control and Data Acquisition (SCADA) system is a control system which is widely used in Critical Infrastructure System to monitor and control industrial processes autonomously.
Puliadi Premnath, Amritha
core   +1 more source

Home - About - Disclaimer - Privacy