Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography ...
Jui-Di Wu +3 more
doaj +1 more source
How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core +2 more sources
Arabic Text Encryption Using Artificial Neural Networks [PDF]
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj +1 more source
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou +8 more
doaj +1 more source
Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj +1 more source
ESSVCS: an enriched secret sharing visual cryptography [PDF]
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics.
A. Shamir +17 more
core +1 more source
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin +5 more
doaj +1 more source
A Practical Analysis of the Fermat Factorization and Pollard Rho Method for Factoring Integers
The development of public-key cryptography generation using the factoring method is very important in practical cryptography applications. In cryptographic applications, the urgency of factoring is very risky because factoring can crack public and ...
Aminudin Aminudin, Eko Budi Cahyono
doaj +1 more source
Identity-based key-insulated aggregate signature scheme
Private key exposure can be the most devastating attack on cryptographic schemes; as such exposure leads to the breakage of security of the scheme as a whole. In the real world scenario, this problem is perhaps the biggest threat to cryptography.
P. Vasudeva Reddy, P.V.S.S.N. Gopal
doaj +1 more source
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon +20 more
core +8 more sources

