Results 61 to 70 of about 434,852 (214)

AAβ-Cryptosystem: a chaos based public key cryptosystem [PDF]

open access: yes, 2009
We describe the AAβ-cryptosystem, a new public key cryptosystem that is built by utilizing the classical one-way chaotic beta-transformati on mapping given by by fβ=βx (mod 1). The AAb-cryptosystem represents its private keys as a vector dA and uses the
Kamel Ariffin, Muhammad Rezal   +1 more
core  

NTRU Lattice–Based Blockchain Consensus–Assisted Vehicle‐to‐Vehicle Authenticated Message Delivery in Internet of Vehicles

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 8, 25 May 2025.
Overview of blockchain supported multisignature algorithm for IoV. ABSTRACT The Internet of Vehicles (IoV) has emerged as a promising application capable of enhancing transportation efficiency and providing a variety of mobile services to drivers. This IoV enables real‐time data sharing among vehicles and infrastructure, allowing for better traffic ...
Dushyant Kumar Yadav   +3 more
wiley   +1 more source

A New "F-Lueg" Cryptosystem and its Security [PDF]

open access: yes, 2002
In this thesis, we present a new public-key cryptosystem and a new digital signature based on the extended Lucas function analogue to EIGamal cryptosystem. We name it" F-LUEG" cryptosystem. Chapter 2, we point out how an extended Lucas function can be
Choo, Mun Yoong
core  

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 5, May 2025.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

McEliece public key cryptosystem attack algorithm based on enumeration error vector

open access: yesTongxin xuebao, 2014
The research on the security of McEliece (M) public key cryptosystem was presented. The Hamming weight of error vector is less than the code length, and M public key cryptosystem based on Goppa code possesses low weight public code words. Considering the
Jing-mei LIU   +3 more
doaj   +2 more sources

A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later [PDF]

open access: yes, 2018
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is apparently new.
Stinson, Douglas R.
core   +1 more source

On improving security of GPT cryptosystems

open access: yes, 2009
The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding.
Gabidulin, Ernst M.   +2 more
core   +1 more source

Fair Public-Key Cryptosystems [PDF]

open access: yes, 2007
We show how to construct public-key cryptosystems that are fair, that is, strike a good balance, in a democratic country, between the needs of the Government and those of the Citizens. Fair public-key cryptosystems guarantee that: (1) the system cannot be misused by criminal organizations and (2) the Citizens mantarn exactly the same rights to privacy ...
openaire   +1 more source

Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain‐Based Intrusion Detection System for Smart Cities

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 36, Issue 4, April 2025.
Security is a crucial factor for information systems and other vital infrastructures. Ensuring robust security measures is imperative due to the substantial volume of network traffic. On the other side, many network components are susceptible to cyber threats and attacks owing to their inherent properties.
Fatima Al‐Quayed   +5 more
wiley   +1 more source

Cryptosystem Based on Induced Group Codes

open access: yesМоделирование и анализ информационных систем, 2016
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj   +1 more source

Home - About - Disclaimer - Privacy