Results 171 to 180 of about 434,852 (214)
Some of the next articles are maybe not open access.
Vulnerable Public Keys in NTRU Cryptosystem
Chinese Annals of Mathematics, Series B, 2020zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Liqing +3 more
openaire +2 more sources
International Journal of Systems Science, 1990
Abstract The development of a new public-key cryptosystem is discussed. This system is a hybrid combination of the RSA (Rivest-Shamir-Adleman) and knapsack crypto-systems. The message is encrypted in two stages using the knapsack algorithm followed by the RSA algorithm, and then decrypted in reverse order.
SAAD M. KALlPHA +2 more
openaire +1 more source
Abstract The development of a new public-key cryptosystem is discussed. This system is a hybrid combination of the RSA (Rivest-Shamir-Adleman) and knapsack crypto-systems. The message is encrypted in two stages using the knapsack algorithm followed by the RSA algorithm, and then decrypted in reverse order.
SAAD M. KALlPHA +2 more
openaire +1 more source
Rabin Public-Key Cryptosystem in the Domain of Gaussian Integers
International Conferences on Computing Advancements, 2018In this paper, we extend Rabin public-key cryptosys-tern from its classical settings which is the domain of natural integers, $\mathbb{Z}_{N}$, to a new setting which is the domain of Gaussian integers $\mathbb{Z}[i]$ modulo $N$. The modified methods are
Y. Awad, A. El-Kassar, T. Kadri
semanticscholar +1 more source
Quaternion public key cryptosystems
2016 World Congress on Industrial Control Systems Security (WCICSS), 2016In this paper, quaternion key exchange protocol and quaternion public key encryption scheme are proposed. The security of proposals relies on hardness of the hidden quaternion conjugacy search problem, that is, difficulty of solving the simultaneous quaternion discrete logarithmic problem and quaternion conjugacy search problem over quaternion rings ...
Maheswara Rao Valluri +1 more
openaire +1 more source
A Survey of Public-Key Cryptosystems
SIAM Review, 2004The authors not only provide an overview of the best public-key ciphers, but also show how difficult a task it is to rank such cryptosystems. Their list of references is extensive with 124 items for further reading. Anyone interested in this topic should have a look at this paper.
Koblitz, Neal, Menezes, Alfred J.
openaire +2 more sources
Public-key ID-based cryptosystem
Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, 2002It is shown how a chosen-public-key attack can compromise the ID-based cryptosystem of S. Tsujii and T. Itoh (1989), as well as most of the existing public-key cryptosystems. The authors present a scheme which can withstand the chosen-public-key attack, based on the concept of an cryptosystem.
H.-M. Sun, T. Hwang
openaire +1 more source
1986
It was only recently that public key cryptography developed into a precise mathematical subject, mainly as a response to the growing need for secure transmission of information via the electronic media. The main new idea was to base the security of cryptosystems on the intractability of number theory problems.
openaire +1 more source
It was only recently that public key cryptography developed into a precise mathematical subject, mainly as a response to the growing need for secure transmission of information via the electronic media. The main new idea was to base the security of cryptosystems on the intractability of number theory problems.
openaire +1 more source
Distributed public key cryptosystems
1998The cryptographic community has developed many tools to incorporate distributed trust mechanisms into cryptographic primitives and protocols as well as primitives where parties are naturally distributed. Since the fastest growing paradigm in computing is distributed systems and communication networks, the importance of distributed mechanisms has been ...
Yair Frankel, Moti Yung
openaire +1 more source
KETA: Public-key symmetric cryptosystem
2010 4th International Conference on Application of Information and Communication Technologies, 2010The new method of encrypting has been developed. The difference from existing methods is that the identifier of one of the agreed plaintexts (resource files) and the number of the combinatorial permutation of symbols of the indicated resource file is being transmitted, but not the ciphertext. In this connection the developed cryptosystem was named KETA
B. T. Kabulov, N. B. Tashpulatova
openaire +1 more source

