Results 251 to 260 of about 13,982 (300)
Some of the next articles are maybe not open access.
Public-key encryption with chaos
Chaos: An Interdisciplinary Journal of Nonlinear Science, 2004We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest–Shamir–Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.
Kocarev, Ljupco +3 more
openaire +3 more sources
2017
In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal.
openaire +1 more source
In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal.
openaire +1 more source
Leakage-resilient certificateless public key encryption
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013In certificateless public key encryption (CL-PKE), the Private Key Generator (PKG) keeps a master secret key to generate a partial private key corresponding to a user's identity. Together with a secret value generated by the user, a full private key can be constructed for decryption.
Zhang, C +4 more
openaire +2 more sources
2001
A key problem of the symmetric cryptosystems that we have described so far is key distribution and key management. When Alice and Bob use such a system, they must exchange a secret key before they can secretly communicate. For the key-exchange, they need, for example, a secure channel or a courier.
openaire +1 more source
A key problem of the symmetric cryptosystems that we have described so far is key distribution and key management. When Alice and Bob use such a system, they must exchange a secret key before they can secretly communicate. For the key-exchange, they need, for example, a secure channel or a courier.
openaire +1 more source
Multipurpose Public-Key Encryption
2017We propose a new type of public-key schemes, that simultaneously satisfies selective opening (SO) security, key-dependent message (KDM) security and leakage-resilience. Our construction can be instantiated under the quadratic residuosity (QR) assumption or decisional composite residuosity (DCR) assumption.
Rui Zhang, Kai He
openaire +1 more source
2017
This paper proposes a public-key cryptosystem and a short password encryption mode, where traditional hardness assumptions are replaced by specific refinements of the CAPTCHA concept called Decisional and Existential CAPTCHAs.
Houda Ferradi +2 more
openaire +1 more source
This paper proposes a public-key cryptosystem and a short password encryption mode, where traditional hardness assumptions are replaced by specific refinements of the CAPTCHA concept called Decisional and Existential CAPTCHAs.
Houda Ferradi +2 more
openaire +1 more source

