Results 1 to 10 of about 19,193 (189)
Length-based cryptanalysis: the case of Thompson's group [PDF]
The length-based approach is a heuristic for solving randomly generated equations in groups that possess a reasonably behaved length function. We describe several improvements of the previously suggested length-based algorithms, which make them ...
Ruinskiy Dima, Shamir Adi, Tsaban Boaz
doaj +3 more sources
Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity [PDF]
The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems.
Ritu Redhu +5 more
doaj +2 more sources
Public key cryptosystem MST3: cryptanalysis and realization
A new type of public key cryptosystem, called MST3, has been recently introduced on the basis of covers and logarithmic signatures for non-abelian finite groups.
Svaba Pavol, Trung Tran van
doaj +4 more sources
Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [PDF]
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem ...
YE Sheng-nan, CHEN Jian-hua
doaj +1 more source
Triple receiver public key encryption cryptosystem
A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple ...
Liutao ZHAO +4 more
doaj +3 more sources
A Complete Public-Key Cryptosystem [PDF]
We present a cryptosystem which is complete for the class of probabilistic public-key cryptosystems with bounded error. Besides traditional encryption schemes such as RSA and El Gamal, this class contains probabilistic encryption of Goldwasser-Micali as well as Ajtai-Dwork and NTRU cryptosystems.
Grigoriev, D., Hirsch, E., Pervyshev, K.
openaire +5 more sources
A Lattice-Based Public-Key Cryptosystem [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cai, Jin-Yi, Cusick, Thomas W.
openaire +2 more sources
A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma +1 more
doaj +1 more source
A lightweight McEliece cryptosystem co-processor design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core +2 more sources
Secure and linear cryptosystems using error-correcting codes [PDF]
A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented.
Cover T. M. +9 more
core +2 more sources

