Results 21 to 30 of about 434,852 (214)

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

Poly-Dragon: an efficient multivariate public key cryptosystem

open access: yesJournal of Mathematical Cryptology, 2011
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our cryptosystem contains polynomials of total degree three in plaintext and ciphertext variables, two in plaintext variables and one in ciphertext variables ...
Singh Rajesh P., Saikia A., Sarma B. K.
doaj   +1 more source

Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]

open access: yes, 2011
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core   +5 more sources

Public key cryptosystem based on algebraic geometric codes

open access: yesTongxin xuebao, 2008
A public-key cryptosystem based on algebraic geometric codes was proposed.The cryptosystem is a pub-lic-key system combined with error correcting.Compared with M public-key system and some variants,the performance of the public-key cryptosystem was ...
ZHANG Ying, YUE Dian-wu
doaj   +2 more sources

Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes

open access: yesEntropy, 2022
Error-correcting codes form an important topic in information theory. They are used to correct errors that occur during transmission on a noisy channel. An important method for correcting errors is bounded distance decoding.
Selda Çalkavur
doaj   +1 more source

Public Key Cryptosystem based on Matrices

open access: yesInternational Journal of Computer Applications, 2019
In this article, a novel public key cryptosystem is introduced by using an abelian subgroup of GL(k;Zn) where n and k are positive integers. Instead of exponentiation, the conjugation automorphisms are mainly used to define the public and private keys ...
Zekeriya Y., Erkam Luy, Bilal Gonen
semanticscholar   +1 more source

CQTRU: A Commutative Quaternions Rings Based Public Key Cryptosystem [PDF]

open access: yesEngineering and Technology Journal, 2016
In this paper, we propose a new version of the NTRU public key cryptosystem called CQTRU. It is a four-dimensional cryptosystem based on the commutative quaternion ring.
Nadia M.G. Alsaidi   +2 more
doaj   +1 more source

A Smart Approach for GPT Cryptosystem Based on Rank Codes

open access: yes, 2010
The concept of Public- key cryptosystem was innovated by McEliece's cryptosystem. The public key cryptosystem based on rank codes was presented in 1991 by Gabidulin -Paramonov-Trejtakov(GPT).
Gabidulin, Ernst M.   +2 more
core   +1 more source

Novel extended multivariate public key cryptosystem

open access: yesTongxin xuebao, 2014
To resist linearization attack and differential attack effectively, a nonlinear invertible transformation based on“tame transformation” was constructed.
Shuai-ting QIAO, Yi-fa LI, Wen-bao HAN
doaj   +2 more sources

Cryptanalysis of the MST3 public key cryptosystem

open access: yesJournal of Mathematical Cryptology, 2009
This paper describes a cryptanalysis of MST3, a public key cryptosystem based on nonabelian groups recently proposed by Lempken, Magliveras, van Trung and Wei.
Blackburn Simon R.   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy