Results 1 to 10 of about 16,729,036 (330)

Non-Invertible Public Key Certificates [PDF]

open access: yesEntropy, 2021
Post-quantum public cryptosystems introduced so far do not define a scalable public key infrastructure for the quantum era. We demonstrate here a public certification system based on Lizama’s non-invertible key exchange protocol which can be used to ...
Luis Adrián Lizama-Perez   +1 more
doaj   +4 more sources

Split logarithm problem and a candidate for a post-quantum signature scheme [PDF]

open access: yesComputer Science Journal of Moldova, 2022
A new form of the hidden discrete logarithm problem, called split logarithm problem, is introduced as primitive of practical post-quantum digital signature schemes, which is characterized in using two non-permutable elements $A$ and $B$ of a finite non-
A.A. Moldovyan, N.A. Moldovyan
doaj   +1 more source

Generalization of RSA cryptosystem based on 2n primes

open access: yesAIMS Mathematics, 2023
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah   +4 more
doaj   +1 more source

A new type of digital signature algorithms with a hidden group [PDF]

open access: yesComputer Science Journal of Moldova, 2023
The known designs of digital signature schemes with a hidden group, which use finite non-commutative algebras as algebraic support, are based on the computational complexity of the so-called hidden discrete logarithm problem.
Dmitriy N. Moldovyan
doaj   +1 more source

A Triple Unlocking Mechanism Model Against Forging Signature Attack Based on Multivariate Polynomial Public Key Cryptosystem

open access: yesIEEE Access, 2023
Since the original signature model did not account for the possible threat of the forging signature attack, the majority of existing multivariate polynomial public key based signature schemes are at risk of forging signatures by equivalent key attacks ...
Yongyan Hou   +4 more
doaj   +1 more source

Blockchain based system for transfer of funds through an e-Governance application [PDF]

open access: yesRevista Română de Informatică și Automatică, 2022
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI   +3 more
doaj   +1 more source

Public-Key Encryption with Quantum Keys

open access: yes, 2023
This submission subsumes arXiv:2303.01143 and arXiv:2303 ...
Khashayar Barooti   +6 more
openaire   +2 more sources

3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based

open access: yesIEEE Access, 2020
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj   +1 more source

Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment

open access: yesIEEE Access, 2020
With the public key being the parameter users are mostly addressed by on blockchain network, an intruder can connect transactional patterns to the public key and make a probable revelation of the identity of the user.
Bonnah Ernest, Ju Shiguang
doaj   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy