Results 31 to 40 of about 434,852 (214)

Cryptographical Properties of Ising Spin Systems

open access: yes, 2000
The relation between Ising spin systems and public-key cryptography is investigated using methods of statistical physics. The insight gained from the analysis is used for devising a matrix-based cryptosystem whereby the ciphertext comprises products of ...
B. Derrida   +19 more
core   +1 more source

On a new fast public key cryptosystem [PDF]

open access: yes, 2015
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core  

Applications of single-qubit rotations in quantum public-key cryptography

open access: yes, 2008
We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum ...
A. Kawachi   +3 more
core   +1 more source

Cryptanalysis of a homomorphic public-key cryptosystem over a finite group

open access: yesJournal of Mathematical Cryptology, 2007
The paper cryptanalyses a public-key cryptosystem recently proposed by Grigoriev and Ponomarenko, which encrypts an element from a fixed finite group defined in terms of generators and relations to produce a ciphertext from .
Choi Su-Jeong   +2 more
doaj   +1 more source

Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes

open access: yes, 2013
We consider the framework of the McEliece cryptosystem based on LDPC codes, which is a promising post-quantum alternative to classical public key cryptosystems.
Baldi, Marco   +3 more
core   +1 more source

A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers

open access: yes, 2018
Cryptography is the study that provides security service. It concerns with confidentiality, integrity, and authentication. Public key cryptography provides an enormous revolution in the field of the cryptosystem. It uses two different keys where keys are
Muhammad Ariful Islam   +3 more
semanticscholar   +1 more source

Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif   +6 more
wiley   +1 more source

Unbreakable Codes: RSA Public Key Cryptosystem [PDF]

open access: yes, 2010
The purpose of this paper is to comprehend the evolution of codes and ciphers; along with understanding how to encode and decode a message using RSA coding.
Amzad, Razia
core   +1 more source

LWE Public Key Cryptosystem

open access: yes, 2022
AbstractIn 2005, O.Regev proposed the first LWE public key cryptosystem at Tel Aviv University in Israel based on LWE distribution $$A_{s,\chi }$$. Because of this paper, Regev won the highest award for theoretical computer science in 2018—the Godel Award.
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy