Results 1 to 10 of about 1,467 (91)
Public-key cryptography and invariant theory [PDF]
Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of the known cryptosystems which involve groups.
Dima Grigoriev
openalex +7 more sources
Probability theory and public-key cryptography [PDF]
In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.
Bessonov, Mariya+2 more
openaire +4 more sources
Abstract Public Key Cryptography is a software model that presents the process of encoding information, in this case the documents contained in a file. The encoding process begins by determining the master file or document that is ready to be encoded, then by applying the combination method, shifting and implementing the pass phrase to ...
openaire +1 more source
Joint Operation in Public Key Cryptography [PDF]
We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become interested in cryptography. We believe that the encoding of cryptographic algorithms is an important step in that direction, and it is the
Dragan Vidakovic+3 more
openaire +3 more sources
Thompson’s Group and Public Key Cryptography [PDF]
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established protocols based on numeric computation. Notably, the protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al.
Vladimir Shpilrain, Alexander Ushakov
openaire +3 more sources
On the Cryptanalysis of Public-Key Cryptography [PDF]
Nowadays, the most popular public-key cryptosystems are based on either the integer factorization or the discrete logarithm problem. The feasibility of solving these mathematical problems in practice is studied and techniques are presented to speed-up the underlying arithmetic on parallel architectures.
openaire +2 more sources
Public-key cryptography and password protocols [PDF]
Maurizio Kliban Boyarsky
openalex +1 more source
Public key cryptography and error correcting codes as Ising models [PDF]
David Saad
openalex +1 more source
Certificateless Public Key Cryptography [PDF]
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an
Kenneth G. Paterson, Sattam S. Al-Riyami
openaire +2 more sources