Results 21 to 30 of about 535,713 (347)
A new code‐based digital signature based on the McEliece cryptosystem
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui +2 more
doaj +1 more source
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj +1 more source
Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio +46 more
core +2 more sources
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez +2 more
doaj +1 more source
Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo +5 more
core +2 more sources
07381 Executive Summary - Cryptography [PDF]
The topics covered in the seminar spanned most areas of cryptography, in one way or another, both in terms of the types of schemes (public-key cryptography, symmetric cryptography, hash functions and other cryptographic functions, multi-party protocols ...
+3 more
core +1 more source
Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography
— The Lossless data hiding provides the embedding of data in a host image without any loss of data. This research explain a lossless data hiding and image cryptography method based on Choas - Block to image encryption the lossless means if the marked ...
Monika Bartwal, R. Bharti
semanticscholar +1 more source
Tensor-based trapdoors for CVP and their application to public key cryptography [PDF]
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product.
Fischlin, Roger, Seifert, Jean-Pierre
core +2 more sources
Homomorphic signcryption with public plaintext‐result checkability
Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Shimin Li +3 more
doaj +1 more source
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi +2 more
doaj +1 more source

