Results 21 to 30 of about 434,852 (214)
A new code‐based digital signature based on the McEliece cryptosystem
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui +2 more
doaj +1 more source
Poly-Dragon: an efficient multivariate public key cryptosystem
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our cryptosystem contains polynomials of total degree three in plaintext and ciphertext variables, two in plaintext variables and one in ciphertext variables ...
Singh Rajesh P., Saikia A., Sarma B. K.
doaj +1 more source
Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core +5 more sources
Public key cryptosystem based on algebraic geometric codes
A public-key cryptosystem based on algebraic geometric codes was proposed.The cryptosystem is a pub-lic-key system combined with error correcting.Compared with M public-key system and some variants,the performance of the public-key cryptosystem was ...
ZHANG Ying, YUE Dian-wu
doaj +2 more sources
Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes
Error-correcting codes form an important topic in information theory. They are used to correct errors that occur during transmission on a noisy channel. An important method for correcting errors is bounded distance decoding.
Selda Çalkavur
doaj +1 more source
Public Key Cryptosystem based on Matrices
In this article, a novel public key cryptosystem is introduced by using an abelian subgroup of GL(k;Zn) where n and k are positive integers. Instead of exponentiation, the conjugation automorphisms are mainly used to define the public and private keys ...
Zekeriya Y., Erkam Luy, Bilal Gonen
semanticscholar +1 more source
CQTRU: A Commutative Quaternions Rings Based Public Key Cryptosystem [PDF]
In this paper, we propose a new version of the NTRU public key cryptosystem called CQTRU. It is a four-dimensional cryptosystem based on the commutative quaternion ring.
Nadia M.G. Alsaidi +2 more
doaj +1 more source
A Smart Approach for GPT Cryptosystem Based on Rank Codes
The concept of Public- key cryptosystem was innovated by McEliece's cryptosystem. The public key cryptosystem based on rank codes was presented in 1991 by Gabidulin -Paramonov-Trejtakov(GPT).
Gabidulin, Ernst M. +2 more
core +1 more source
Novel extended multivariate public key cryptosystem
To resist linearization attack and differential attack effectively, a nonlinear invertible transformation based on“tame transformation” was constructed.
Shuai-ting QIAO, Yi-fa LI, Wen-bao HAN
doaj +2 more sources
Cryptanalysis of the MST3 public key cryptosystem
This paper describes a cryptanalysis of MST3, a public key cryptosystem based on nonabelian groups recently proposed by Lempken, Magliveras, van Trung and Wei.
Blackburn Simon R. +2 more
doaj +1 more source

