Results 81 to 90 of about 434,852 (214)

Blockchain‐Enabled Car Sharing: Enhancing Reliability and Vehicle History Management

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
The paper addresses the growing demand for cost‐effective transportation solutions amidst rising car ownership expenses by proposing a decentralized car‐sharing and renting platform called Crowd CarLink, leveraging blockchain technology. This platform enables secure recording of vehicle maintenance and lease history while overcoming challenges of ...
Chen Ben Tolila   +3 more
wiley   +1 more source

Aircraft Identification Scheme using Public-KeyCryptosystem

open access: yesJournal of Engineering and Sustainable Development, 2005
novel approach for identifying friend aircrafts from foe (IFF) using public-key cryptosystem is introduced. Tow schemes of public-key cryptosystem which provide higher security than convention(IFF) are presented computer simulation examples are also ...
Saad Mohammed kaliphs
doaj  

Certificate integration management platform based on identity key

open access: yesTongxin xuebao, 2016
Asymmetric key cryptosystem plays an significant role in the field of information security.Compared with tra-ditional public key cryptosystem,the public key crypto system based on identity simplifies certificate management and reduces system ...
Mu-zhou LIU   +5 more
doaj   +2 more sources

On Decoding Schemes for the MDPC-McEliece Cryptosystem [PDF]

open access: yes, 2018
Recently, it has been shown how McEliece public-key cryptosystems based on moderate-density parity-check (MDPC) codes allow for very compact keys compared to variants based on other code families. In this paper, classical (iterative) decoding schemes for
Bartz, Hannes, Liva, Gianluigi
core   +1 more source

THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2011
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj   +1 more source

An efficient method to generate elliptic curves

open access: yesTongxin xuebao, 2001
In this paper, an efficient method to generate elliptic curves for public key cryptosystems based on discrete logarithm problem is presented. Usually, to resist possible attacks, such as MOV reduction, public key cryptosystems based on elliptic curve E ...
ZHOU Chang-ying1   +2 more
doaj   +2 more sources

An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack

open access: yesMathematical Biosciences and Engineering, 2019
An improved signature model of multivariate polynomial public key cryptosystem to resist the key recovery attack is presented in this paper. Two pairs of public keys are added to design new authentication conditionals for public keys, and then the ...
Xin Wang, Bo Yang
doaj   +1 more source

Analisys of Lattice-based Public Key Cryptosystems

open access: yesБезопасность информационных технологий, 2011
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj  

A random number generator based on NTRU cryptosystem [PDF]

open access: yesMaejo International Journal of Science and Technology, 2010
A random number generator based on the operation of the NTRU cryptosystem is proposed. By using the proposed generator together with the NTRU cryptosystem, we can save hardware and software components.
He Debiao
doaj  

Home - About - Disclaimer - Privacy