Results 71 to 80 of about 434,852 (214)

BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra

open access: yes, 2016
New terms such as closest vector problem (CVP) and the shortest vector problem (SVP), which have been illustrated as NP-hard problem, emerged, leading to a new hope for designing public key cryptosystem based on certain lattice hardness.
N. Al-saidi, H. R. Yassein
semanticscholar   +1 more source

Implementation Security in Quantum Key Distribution

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 2, February 2025.
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. The present work provides a succint review on this topic, focusing on discrete‐variable QKD setups.
Víctor Zapatero   +2 more
wiley   +1 more source

LightAuth: A Lightweight Sensor Nodes Authentication Framework for Smart Health System

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
ABSTRACT Counterfeit medical devices pose a threat to patient safety, necessitating a secure device authentication system for medical applications. Resource‐constrained sensory nodes are vulnerable to hacking, prompting the need for robust security measures.
Zain Ul Islam Adil   +5 more
wiley   +1 more source

A new public key cryptosystem based on IFS [PDF]

open access: yes, 2010
Most public key encryption methods suffers from the inability to prove the difficulty of the algorithms, which summarizes under the category of mathematical problems that have inverses which are believed (but not proven) to be hard.
Md. Said, Mohamad Rushdan   +1 more
core  

A New Public-Key Cryptosystem [PDF]

open access: yes, 1997
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying the public-keys indexed by the message bits and the cleartext is recovered by factoring the ciphertext raised to a secret power. Encryption requires four multiplications/byte and decryption is roughly equivalent to the generation of an RSA signature.
David Naccache, Jacques Stern
openaire   +1 more source

A public key cryptosystem based on diophantine equations of degree increasing type

open access: yes, 2015
In this paper we propose a new public key cryptosystem based on diophantine equations which we call of degree increasing type. We use an analogous method to the “Algebraic Surface Cryptosystem” (ASC) proposed by Akiyama, Goto and Miyake.
Shinya Okumura
semanticscholar   +1 more source

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel   +6 more
wiley   +1 more source

Cryptanalysis of novel extended multivariate public key cryptosystem

open access: yesTongxin xuebao, 2015
The novel extended multivariate public key cryptosystem is a new security enhancement method on multivariate public key cryptosystems,which is proposed by Qiao,et al.A nonlinear invertible transformation was used,named“tame transformation”,on the ...
Xu-yun NIE, Bo LIU, Gang LU, Ting ZHONG
doaj   +2 more sources

Key-Insulated Public Key Cryptosystems [PDF]

open access: yes, 2002
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by ...
Yevgeniy Dodis   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy