Results 1 to 10 of about 16,729,036 (330)
Non-Invertible Public Key Certificates [PDF]
Post-quantum public cryptosystems introduced so far do not define a scalable public key infrastructure for the quantum era. We demonstrate here a public certification system based on Lizama’s non-invertible key exchange protocol which can be used to ...
Luis Adrián Lizama-Perez +1 more
doaj +4 more sources
Split logarithm problem and a candidate for a post-quantum signature scheme [PDF]
A new form of the hidden discrete logarithm problem, called split logarithm problem, is introduced as primitive of practical post-quantum digital signature schemes, which is characterized in using two non-permutable elements $A$ and $B$ of a finite non-
A.A. Moldovyan, N.A. Moldovyan
doaj +1 more source
Generalization of RSA cryptosystem based on 2n primes
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah +4 more
doaj +1 more source
A new type of digital signature algorithms with a hidden group [PDF]
The known designs of digital signature schemes with a hidden group, which use finite non-commutative algebras as algebraic support, are based on the computational complexity of the so-called hidden discrete logarithm problem.
Dmitriy N. Moldovyan
doaj +1 more source
Since the original signature model did not account for the possible threat of the forging signature attack, the majority of existing multivariate polynomial public key based signature schemes are at risk of forging signatures by equivalent key attacks ...
Yongyan Hou +4 more
doaj +1 more source
Blockchain based system for transfer of funds through an e-Governance application [PDF]
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI +3 more
doaj +1 more source
Public-Key Encryption with Quantum Keys
This submission subsumes arXiv:2303.01143 and arXiv:2303 ...
Khashayar Barooti +6 more
openaire +2 more sources
3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj +1 more source
Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment
With the public key being the parameter users are mostly addressed by on blockchain network, an intruder can connect transactional patterns to the public key and make a probable revelation of the identity of the user.
Bonnah Ernest, Ju Shiguang
doaj +1 more source
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee +3 more
doaj +1 more source

