Results 91 to 100 of about 434,852 (214)

The GH Public-Key Cryptosystem [PDF]

open access: yes, 2001
This paper will propose an efficient algorithm that utilizes the signed-digit representation to compute the kth term of a characteristic sequence generated by a linear feedback shift register of order 3 over GF(q). We will also propose an efficient algorithm to compute the (h-dk)th term of the characteristic sequence based on the knowledge of the kth ...
Guang Gong, Lein Harn, Huapeng Wu
openaire   +1 more source

Security of the cryptosystems based on ergodic matrices

open access: yesTongxin xuebao, 2015
The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved ...
Hua-wei HUANG   +3 more
doaj   +2 more sources

A new robust PKC encryption method based on invertible matrix multiplication for HIE in medical IoT systems

open access: yesCybersecurity
Electronic health information exchange (HIE) allows doctors, nurses, pharmacists, other health care providers and patients to appropriately access and securely share a patient’s vital medical information electronically—improving the speed, quality ...
Hailong Yu   +3 more
doaj   +1 more source

An Efficient Public Key Encryption Scheme Based on QC-MDPC Lattices

open access: yesIEEE Access, 2017
In this paper, we introduce a new family of lattices, namely QC-MDPC lattices, which are a special case of LDPC lattices, and an improved bit flipping algorithm for decoding of these lattices. Encoding and decoding implementations of QC-MDPC lattices are
Khadijeh Bagheri   +2 more
doaj   +1 more source

Certificateless Blind Signcryption With Low Complexity

open access: yesIEEE Access, 2019
Elliptic curve cryptosystem (ECC) has the merits of providing shorter key length and higher processing speed compared with other public key cryptosystems with respect to the same security level.
Huifang Yu, Zhicang Wang
doaj   +1 more source

Private Key Extension of Polly Cracker Cryptosystems [PDF]

open access: yesComputer Science Journal of Moldova, 2008
In 1993 Koblitz and Fellows proposed a public key cryptosystem, Polly Cracker, based on the problem of solving multivariate systems of polynomial equations, which was soon generalized to a Dröbner basis formulation.
Nina Taslaman
doaj  

NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks. [PDF]

open access: yesSensors (Basel), 2020
Ibrahim A   +5 more
europepmc   +1 more source

Homomorphic public-key cryptosystems and encrypting boolean circuits

open access: yes, 2003
In this paper homomorphic cryptosystems are designed for the first time over any finite group. Applying Barrington's construction we produce for any boolean circuit of the logarithmic depth its encrypted simulation of a polynomial size over an ...
Grigoriev, Dima, Ponomarenko, Ilia
core   +1 more source

A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes

open access: yes, 2012
Baldi et \textit{al.} proposed a variant of McEliece's cryptosystem. The main idea is to replace its permutation matrix by adding to it a rank 1 matrix.
Gauthier, Valérie   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy