Results 1 to 10 of about 434,852 (214)

Length-based cryptanalysis: the case of Thompson's group [PDF]

open access: yesJournal of Mathematical Cryptology, 2007
The length-based approach is a heuristic for solving randomly generated equations in groups that possess a reasonably behaved length function. We describe several improvements of the previously suggested length-based algorithms, which make them ...
Ruinskiy Dima, Shamir Adi, Tsaban Boaz
doaj   +3 more sources

Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity [PDF]

open access: yesScientific Reports
The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems.
Ritu Redhu   +5 more
doaj   +2 more sources

New trapdoor-knapsack public-key cryptosystem [PDF]

open access: yesIEE Proceedings E Computers and Digital Techniques, 1985
The paper presents a new trapdoor-knapsack public-key cryptosystem. The encryption equation is based on the general modular knapsack equation, but, unlike the Merkle-Hellman scheme, the knapsack components do not have to have a superincreasing structure.
Goodman, R. M. F., McAuley, A. J.
core   +4 more sources

Public key cryptosystem MST3: cryptanalysis and realization

open access: yesJournal of Mathematical Cryptology, 2010
A new type of public key cryptosystem, called MST3, has been recently introduced on the basis of covers and logarithmic signatures for non-abelian finite groups.
Svaba Pavol, Trung Tran van
doaj   +4 more sources

Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [PDF]

open access: yesJisuanji kexue, 2021
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem ...
YE Sheng-nan, CHEN Jian-hua
doaj   +1 more source

Triple receiver public key encryption cryptosystem

open access: yes网络与信息安全学报, 2020
A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple ...
Liutao ZHAO   +4 more
doaj   +3 more sources

A Complete Public-Key Cryptosystem [PDF]

open access: yesGroups – Complexity – Cryptology, 2009
We present a cryptosystem which is complete for the class of probabilistic public-key cryptosystems with bounded error. Besides traditional encryption schemes such as RSA and El Gamal, this class contains probabilistic encryption of Goldwasser-Micali as well as Ajtai-Dwork and NTRU cryptosystems.
Grigoriev, D., Hirsch, E., Pervyshev, K.
openaire   +5 more sources

A Lattice-Based Public-Key Cryptosystem [PDF]

open access: yesInformation and Computation, 1999
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cai, Jin-Yi, Cusick, Thomas W.
openaire   +2 more sources

A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]

open access: yesEngineering and Technology Journal, 2010
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma   +1 more
doaj   +1 more source

Generalization of RSA cryptosystem based on 2n primes

open access: yesAIMS Mathematics, 2023
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy