Results 31 to 40 of about 1,784 (149)
Secure data storage and access for fish monitoring in cloud environment
Cloud computing (CC) refers to the on-demand availability of computer system resources, specifically data storage and computational power, without the user's direct active administration.
K.S. Saraswathy, S.S. Sujatha
doaj +1 more source
Enhanced NTRU cryptosystem eliminating decryption failures
Summary: An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model and chosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reduction algorithms are analyzed to evaluate the security of this scheme.
Yao, Jun, Zeng, Guihua
openaire +1 more source
A general construction for monoid-based knapsack protocols [PDF]
We present a generalized version of the knapsack protocol proposed by D. Naccache and J. Stern at the Proceedings of Eurocrypt (1997). Our new framework will allow the construction of other knapsack protocols having similar security features.
Micheli, Giacomo, Schiavina, Michele
core +1 more source
A New Provably Secure Cryptosystem Using Dedekind Domain Direct Product Approach
We would like to prevent, detect, and protect communication and information systems' attacks, which include unauthorized reading of a message of file and traffic analysis or active attacks, such as modification of messages or files, and denial of service
Amir Hassani Karbasi
doaj +1 more source
A Non-commutative Cryptosystem Based on Quaternion Algebras
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosystem uses bivariate polynomials as the underling ring.
Bagheri, Khadijeh +2 more
core +1 more source
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source
A framework for cryptographic problems from linear algebra
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl +3 more
doaj +1 more source
Cryptographic applications of sparse polynomials over finite rings [PDF]
This is a preprint of a book chapter published in Lecture Notes in Computer Science, 2015, Springer-Verlag, Berlin (2001). The original publication is available at www.springerlink.com.This paper gives new examples that exploit the idea of using sparse ...
Banks, William David, 1964- +3 more
core +1 more source
On the distribution of Low Hamming Weight products
Jeffrey Hoffstein et al. (Discrete Appl. Math. 130:37–49, 2003) introduced the Low Hamming Weight products (LHWP) X = x 1 x 2 x 3 $X=x_{1}x_{2}x_{3}$ as random exponent of elements in a group or a ring to improve the operational efficiency, where each x ...
Jianghua Li, Qiao Li
doaj +1 more source
Application of NTRU Cryptographic Algorithm for securing SCADA communication
Supervisory Control and Data Acquisition (SCADA) system is a control system which is widely used in Critical Infrastructure System to monitor and control industrial processes autonomously.
Puliadi Premnath, Amritha
core +1 more source

