Results 21 to 30 of about 19,193 (189)
Applications of single-qubit rotations in quantum public-key cryptography
We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum ...
A. Kawachi +3 more
core +1 more source
New trapdoor-knapsack public-key cryptosystem [PDF]
This paper presents a new trapdoor-knapsack public-key-cryptosystem. The encryption equation is based on the general modular knapsack equation, but unlike the Merkle-Hellman scheme the knapsack components do not have to have a superincreasing structure.
Goodman, R. M. F., McAuley, A. J.
openaire +3 more sources
Novel extended multivariate public key cryptosystem
To resist linearization attack and differential attack effectively, a nonlinear invertible transformation based on“tame transformation” was constructed.
Shuai-ting QIAO, Yi-fa LI, Wen-bao HAN
doaj +2 more sources
Cryptanalysis of the MST3 public key cryptosystem
This paper describes a cryptanalysis of MST3, a public key cryptosystem based on nonabelian groups recently proposed by Lempken, Magliveras, van Trung and Wei.
Blackburn Simon R. +2 more
doaj +1 more source
Cryptographical Properties of Ising Spin Systems
The relation between Ising spin systems and public-key cryptography is investigated using methods of statistical physics. The insight gained from the analysis is used for devising a matrix-based cryptosystem whereby the ciphertext comprises products of ...
B. Derrida +19 more
core +1 more source
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group
The paper cryptanalyses a public-key cryptosystem recently proposed by Grigoriev and Ponomarenko, which encrypts an element from a fixed finite group defined in terms of generators and relations to produce a ciphertext from .
Choi Su-Jeong +2 more
doaj +1 more source
On a new fast public key cryptosystem [PDF]
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source
RSA: A number of formulas to improve the search for p+qp+q
Breaking RSA is one of the fundamental problems in cryptography. Due to its reliance on the difficulty of the integer factorization problem, no efficient solution has been found despite decades of extensive research. One of the possible ways to break RSA
Mohammed Ahmed, Alkhelaifi Abdulrahman
doaj +1 more source
AbstractIn 2005, O.Regev proposed the first LWE public key cryptosystem at Tel Aviv University in Israel based on LWE distribution $$A_{s,\chi }$$. Because of this paper, Regev won the highest award for theoretical computer science in 2018—the Godel Award.
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire +1 more source

