Results 21 to 30 of about 60,860 (288)

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming

open access: yesWasit Journal of Computer and Mathematics Science, 2022
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj   +1 more source

Efficient constructions for large‐state block ciphers based on AES New Instructions

open access: yesIET Information Security, 2022
Large‐state block ciphers with 256 bits or 512 bits block sizes receive much attention from the viewpoint of long‐term security. Existing large‐state block ciphers, such as Haraka‐v2 and Pholkos, consist of only the AES New Instructions set (AES‐NI) and ...
Rentaro Shiba   +2 more
doaj   +1 more source

Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm

open access: yesScientific Reports, 2022
We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ...
Xiangyu Chang   +4 more
doaj   +1 more source

First end‐to‐end PQC protected DPU‐to‐DPU communications

open access: yesElectronics Letters, 2023
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera   +4 more
doaj   +1 more source

Enriching Information Security via Hybrid of New Expand Rivest Shamir Adleman and Data Encryption Standard Cryptosystem

open access: yesJournal of Applied Sciences and Environmental Management, 2023
Cryptography system gives security services ability to protect information from people who are authorized to use it. This research introduces elevated information security system via hybrid of new expand Rivest Shamir Adleman (RSA) and data encryption ...
M. B. Hammawa   +2 more
doaj   +1 more source

Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem

open access: yesEmerging Science Journal, 2021
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC).
Maitri Patel, Rajan Patel
doaj   +1 more source

Quantum asymmetric key crypto scheme using Grover iteration

open access: yesScientific Reports, 2023
Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside ...
Chun Seok Yoon   +4 more
doaj   +1 more source

Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation

open access: yesIEEE Access, 2017
Rainbow is one of the most important signature schemes in multivariate public key cryptography. It enjoys a strong security guarantee and is a promising signature scheme in Post-Quantum Cryptography. However, it suffers from large key size. In this paper,
Zhiniang Peng, Shaohua Tang
doaj   +1 more source

Quantum Cryptography in Practice [PDF]

open access: yes, 2003
BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks.
Elliott, Chip   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy