Results 91 to 100 of about 219,404 (221)
Asynchronous distributed private-key generators for identity-based cryptography [PDF]
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages over the Internet. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can ...
Aniket Kate, Ian Goldberg
core
CASDC: A Cryptographically Secure Data System Based on Two Private Key Images
Mua’ad Abu-Faraj+4 more
openalex +1 more source
Model for cryptography protection of confidential information [PDF]
УДК 004.056 Борсуковський Ю.В., Борсуковська В.Ю. Модель криптографічного захисту конфіденційної інформації В даній статті проведено детальний аналіз вимог щодо формування моделі криптографічного захисту конфіденційної інформації.
Борсуковська, Вікторія Юріївна+1 more
core
Hybrid Cryptography for Random-key Generation based on ECC Algorithm
As more increase in usage of communications and developing them more user friendly. While developing those communications, we need to take care of security and safety of user’s data.
P. Gayathri+5 more
semanticscholar +1 more source
Breaking the Hidden Irreducible Polynomials Scheme [PDF]
In 2019 G\'omez described a new public key cryptography scheme based on ideas from multivariate public key cryptography using hidden irreducible polynomials.
Eder, Christian
core +1 more source
Enhancing Image Cryptography Performance with Block Left Rotation Operations
In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages
M. Al-batah+3 more
semanticscholar +1 more source
Implementation of Italian industry 4.0 quantum testbed in Turin
The security of data communications is one of the crucial challenges that our society is facing today. Quantum Key Distribution (QKD) is one of the most prominent methods for guaranteeing ultimate security based on the laws of quantum physics.
Nicola Corrias+17 more
doaj +1 more source
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the session
Vlad-Florin Drăgoi+4 more
doaj +1 more source
THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj +1 more source
Boson Sampling Private-Key Quantum Cryptography [PDF]
We introduce a quantum private-key encryption protocol based on multi-photon interference in linear optics networks. The scheme builds upon Boson Sampling, and we show that it is hard to break, even for a quantum computer.
Berry, DW+5 more
core