Results 161 to 170 of about 434,852 (214)
Some of the next articles are maybe not open access.

A generalization of the ElGamal public-key cryptosystem

IACR Cryptology ePrint Archive, 2021
The ElGamal cryptosystem is one of the most widely used public-key cryptosystems that depends on the difficulty of computing the discrete logarithms over finite fields. Over the years, the original system has been modified and altered in order to achieve
Raj Ranasinghe, Pabasara Athukorala
semanticscholar   +1 more source

Public Key Cryptosystem

Introduction to Cryptography, 2018
Sahadeo Padhye   +2 more
openaire   +2 more sources

An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem

International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2020
Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends on RSA algorithm. First, a pair of public and private keys is generated by RSA algorithm.
G. Ye   +4 more
semanticscholar   +1 more source

Quantum Public-Key Cryptosystem

International Journal of Theoretical Physics, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Luo, Ming-Xing   +3 more
openaire   +1 more source

Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions

IEEE Internet of Things Journal, 2019
Due to its widespread popularity and usage in many applications (smart transport, energy management, ${e}$ -healthcare, smart ecosystem, and so on), the Internet of Things (IoT) has become popular among end users over the last few years. However, with an
Rajat Chaudhary   +3 more
semanticscholar   +1 more source

A public key cryptosystem using Affine Hill Cipher under modulation of prime number

Journal of Information and Optimization Sciences, 2019
M.K. Viswanath in [1] proposed the concepts a public key cryptosystem using Hill’s Cipher. This paper develops a public key cryptosystem using Affine Hill Cipher.
P. Sundarayya, N. Raju, M. Prasad
semanticscholar   +1 more source

Complexity Measures for Public-Key Cryptosystems

SIAM Journal on Computing, 1988
A general theory of public-key cryptography is developed that is based on the mathematical framework of complexity theory. Two related approaches are taken to the development of this theory, and these approaches correspond to different but equivalent formulations of the problem of cracking a public-key cryptosystem (PKCS).
Grollmann, Joachim, Selman, Alan L.
openaire   +2 more sources

Coalition Public-Key Cryptosystems

Cybernetics and Systems Analysis, 2001
A coalition is understood to be a group of participants (coalitionists) who can collaborate in order to achieve common objectives. The basic principle of a coalition is the absence of a threat to communication flows within the coalition from its participants. In this paper, two new RSA coalition protocols are considered. According to the first protocol,
openaire   +1 more source

Stateful public-key cryptosystems

Proceedings of the 13th ACM conference on Computer and communications security, 2006
We show how to significantly speed-up the encryption portion of some public-key cryptosystems by the simple expedient of allowing a sender to maintain state that is re-used across different encryptions.In particular we present stateful versions of the DHIES and Kurosawa-Desmedt schemes that each use only 1 exponentiation to encrypt, as opposed to 2 and
Mihir Bellare   +2 more
openaire   +1 more source

Public-Key Cryptosystems

2003
In 1976 Diffie and Hellman [152] described the framework for public-key cryptography. It was not until 1978 that three designs for public-key cryptosystems were published. Rivest, Shamir, and Adleman [431] showed how the discrete logarithm and factorization problems could be used to construct a public-key cryptosystem.
Josef Pieprzyk   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy