Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm [PDF]
One of the most difficult problems in web research is security. Cryptography is the fundamental technique utilized in secure communication. One key element of cryptography is Public-Key Cryptography (PKC).
Abdalhossein Rezai
doaj +1 more source
Survey on SAP and its application in public-key cryptography
The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was
Goel Neha, Gupta Indivar, Dass B. K.
doaj +1 more source
ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools [PDF]
The correct adoption of cryptography APIs is challenging for mainstream developers, often resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have demonstrated inconsistent performance and remain largely inaccessible to most developers. We investigated the extent to which ChatGPT can detect cryptography misuses and compared its
arxiv +1 more source
Combinatorial group theory and public key cryptography
After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that the conjugacy search problem is unlikely to provide sufficient level of security if a ...
Shpilrain, Vladimir, Zapata, Gabriel
core +2 more sources
Public key cryptography in resource-constrained WSN [PDF]
In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs). In the early days of sensor networks, public key cryptography was thought to be completely unfeasible considering its ...
Hong, Choong Seon, Pathan, Al-Sakib Khan
core
Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
On the basis of ghost imaging, this paper proposes a multiple-image encryption scheme combining public key cryptography and Hadamard basis pattern. In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for
Leihong Zhang+3 more
doaj +1 more source
Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications. [PDF]
Astorga J+3 more
europepmc +1 more source
Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj
The dangerous path towards your own cryptography method [PDF]
Would you like to have your own cryptography method? Experts say you should not do it. If you think you can develop a better cryptography method anyway. We present a brief discussion about some well known cryptography methods and how our model fails against the traditional attacks.
arxiv
Global DDoS Threat Landscape Tracking Network Anomalies using Elliptic Curve Cryptography [PDF]
Devices, such as in mobile devices or RFID. In brief, ECC based algorithms can be easily comprised into existing protocols to get the same retrograde compatibility and security with lesser resources.: Recent variants of Distributed Denial-of-Service ...
, K. Ravikumar, S. Soundharya
core +1 more source