Results 11 to 20 of about 116,815 (231)

Breaking the Hidden Irreducible Polynomials Scheme [PDF]

open access: yesarXiv, 2019
In 2019 G\'omez described a new public key cryptography scheme based on ideas from multivariate public key cryptography using hidden irreducible polynomials. We show that the scheme's design has a flaw which lets an attacker recover the private key directly from the public key.
Eder, Christian
arxiv   +4 more sources

Public Key Cryptography based on Semigroup Actions [PDF]

open access: green, 2005
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve.
Gkrard Maze   +2 more
openalex   +4 more sources

Applications of single-qubit rotations in quantum public-key cryptography [PDF]

open access: green, 2008
We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum ...
Georgios M. Nikolopoulos
openalex   +3 more sources

Computational Thinking Enrichment: Public-Key Cryptography [PDF]

open access: diamondInformatics in Education, 2018
The Computer Science Unplugged activities and project has been an influential STEM (Science, Technology, Engineering & Mathematics) initiative, providing enrichment and teaching activities supporting computational thinking.
Frances Rosamond
openalex   +3 more sources

Public-Key Cryptography Based on Tropical Circular Matrices [PDF]

open access: goldApplied Sciences, 2022
Some public-key cryptosystems based on the tropical semiring have been proposed in recent years because of their increased efficiency, since the multiplication is actually an ordinary addition of numbers and there is no ordinary multiplication of numbers
Huawei Huang, Chunhua Li, Lunzhi Deng
openalex   +3 more sources

Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures [PDF]

open access: goldIET Information Security, 2021
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi   +2 more
openalex   +2 more sources

Revocable identity‐based matchmaking encryption in the standard model

open access: yesIET Information Security, 2023
Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party.
Zhe Jiang   +5 more
doaj   +1 more source

Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes

open access: yesIET Information Security, 2021
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh   +3 more
doaj   +1 more source

On Multiple Encryption for Public-Key Cryptography

open access: yesCryptography, 2023
Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due to ...
Tudor Soroceanu   +2 more
doaj   +1 more source

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy