Results 71 to 80 of about 434,852 (214)
BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra
New terms such as closest vector problem (CVP) and the shortest vector problem (SVP), which have been illustrated as NP-hard problem, emerged, leading to a new hope for designing public key cryptosystem based on certain lattice hardness.
N. Al-saidi, H. R. Yassein
semanticscholar +1 more source
Implementation Security in Quantum Key Distribution
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. The present work provides a succint review on this topic, focusing on discrete‐variable QKD setups.
Víctor Zapatero +2 more
wiley +1 more source
LightAuth: A Lightweight Sensor Nodes Authentication Framework for Smart Health System
ABSTRACT Counterfeit medical devices pose a threat to patient safety, necessitating a secure device authentication system for medical applications. Resource‐constrained sensory nodes are vulnerable to hacking, prompting the need for robust security measures.
Zain Ul Islam Adil +5 more
wiley +1 more source
A new public key cryptosystem based on IFS [PDF]
Most public key encryption methods suffers from the inability to prove the difficulty of the algorithms, which summarizes under the category of mathematical problems that have inverses which are believed (but not proven) to be hard.
Md. Said, Mohamad Rushdan +1 more
core
A New Public-Key Cryptosystem [PDF]
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying the public-keys indexed by the message bits and the cleartext is recovered by factoring the ciphertext raised to a secret power. Encryption requires four multiplications/byte and decryption is roughly equivalent to the generation of an RSA signature.
David Naccache, Jacques Stern
openaire +1 more source
A public key cryptosystem based on diophantine equations of degree increasing type
In this paper we propose a new public key cryptosystem based on diophantine equations which we call of degree increasing type. We use an analogous method to the “Algebraic Surface Cryptosystem” (ASC) proposed by Akiyama, Goto and Miyake.
Shinya Okumura
semanticscholar +1 more source
A comprehensive survey on software‐defined networking for smart communities
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary +3 more
wiley +1 more source
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel +6 more
wiley +1 more source
Cryptanalysis of novel extended multivariate public key cryptosystem
The novel extended multivariate public key cryptosystem is a new security enhancement method on multivariate public key cryptosystems,which is proposed by Qiao,et al.A nonlinear invertible transformation was used,named“tame transformation”,on the ...
Xu-yun NIE, Bo LIU, Gang LU, Ting ZHONG
doaj +2 more sources
Key-Insulated Public Key Cryptosystems [PDF]
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by ...
Yevgeniy Dodis +3 more
openaire +1 more source

