Results 1 to 10 of about 19,193 (189)

Length-based cryptanalysis: the case of Thompson's group [PDF]

open access: yesJournal of Mathematical Cryptology, 2007
The length-based approach is a heuristic for solving randomly generated equations in groups that possess a reasonably behaved length function. We describe several improvements of the previously suggested length-based algorithms, which make them ...
Ruinskiy Dima, Shamir Adi, Tsaban Boaz
doaj   +3 more sources

Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity [PDF]

open access: yesScientific Reports
The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems.
Ritu Redhu   +5 more
doaj   +2 more sources

Public key cryptosystem MST3: cryptanalysis and realization

open access: yesJournal of Mathematical Cryptology, 2010
A new type of public key cryptosystem, called MST3, has been recently introduced on the basis of covers and logarithmic signatures for non-abelian finite groups.
Svaba Pavol, Trung Tran van
doaj   +4 more sources

Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [PDF]

open access: yesJisuanji kexue, 2021
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem ...
YE Sheng-nan, CHEN Jian-hua
doaj   +1 more source

Triple receiver public key encryption cryptosystem

open access: yes网络与信息安全学报, 2020
A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple ...
Liutao ZHAO   +4 more
doaj   +3 more sources

A Complete Public-Key Cryptosystem [PDF]

open access: yesGroups – Complexity – Cryptology, 2009
We present a cryptosystem which is complete for the class of probabilistic public-key cryptosystems with bounded error. Besides traditional encryption schemes such as RSA and El Gamal, this class contains probabilistic encryption of Goldwasser-Micali as well as Ajtai-Dwork and NTRU cryptosystems.
Grigoriev, D., Hirsch, E., Pervyshev, K.
openaire   +5 more sources

A Lattice-Based Public-Key Cryptosystem [PDF]

open access: yesInformation and Computation, 1999
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cai, Jin-Yi, Cusick, Thomas W.
openaire   +2 more sources

A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]

open access: yesEngineering and Technology Journal, 2010
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma   +1 more
doaj   +1 more source

A lightweight McEliece cryptosystem co-processor design [PDF]

open access: yes, 2020
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi   +3 more
core   +2 more sources

Secure and linear cryptosystems using error-correcting codes [PDF]

open access: yes, 2000
A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented.
Cover T. M.   +9 more
core   +2 more sources

Home - About - Disclaimer - Privacy