Results 1 to 10 of about 434,852 (214)
Length-based cryptanalysis: the case of Thompson's group [PDF]
The length-based approach is a heuristic for solving randomly generated equations in groups that possess a reasonably behaved length function. We describe several improvements of the previously suggested length-based algorithms, which make them ...
Ruinskiy Dima, Shamir Adi, Tsaban Boaz
doaj +3 more sources
Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity [PDF]
The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems.
Ritu Redhu +5 more
doaj +2 more sources
New trapdoor-knapsack public-key cryptosystem [PDF]
The paper presents a new trapdoor-knapsack public-key cryptosystem. The encryption equation is based on the general modular knapsack equation, but, unlike the Merkle-Hellman scheme, the knapsack components do not have to have a superincreasing structure.
Goodman, R. M. F., McAuley, A. J.
core +4 more sources
Public key cryptosystem MST3: cryptanalysis and realization
A new type of public key cryptosystem, called MST3, has been recently introduced on the basis of covers and logarithmic signatures for non-abelian finite groups.
Svaba Pavol, Trung Tran van
doaj +4 more sources
Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [PDF]
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem ...
YE Sheng-nan, CHEN Jian-hua
doaj +1 more source
Triple receiver public key encryption cryptosystem
A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple ...
Liutao ZHAO +4 more
doaj +3 more sources
A Complete Public-Key Cryptosystem [PDF]
We present a cryptosystem which is complete for the class of probabilistic public-key cryptosystems with bounded error. Besides traditional encryption schemes such as RSA and El Gamal, this class contains probabilistic encryption of Goldwasser-Micali as well as Ajtai-Dwork and NTRU cryptosystems.
Grigoriev, D., Hirsch, E., Pervyshev, K.
openaire +5 more sources
A Lattice-Based Public-Key Cryptosystem [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cai, Jin-Yi, Cusick, Thomas W.
openaire +2 more sources
A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma +1 more
doaj +1 more source
Generalization of RSA cryptosystem based on 2n primes
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah +4 more
doaj +1 more source

