Results 1 to 10 of about 6,586,318 (243)

Non-Invertible Public Key Certificates [PDF]

open access: yesEntropy, 2021
Post-quantum public cryptosystems introduced so far do not define a scalable public key infrastructure for the quantum era. We demonstrate here a public certification system based on Lizama’s non-invertible key exchange protocol which can be used to ...
Luis Adrián Lizama-Perez   +1 more
doaj   +4 more sources

Split logarithm problem and a candidate for a post-quantum signature scheme [PDF]

open access: yesComputer Science Journal of Moldova, 2022
A new form of the hidden discrete logarithm problem, called split logarithm problem, is introduced as primitive of practical post-quantum digital signature schemes, which is characterized in using two non-permutable elements $A$ and $B$ of a finite non-
A.A. Moldovyan, N.A. Moldovyan
doaj   +1 more source

A new type of digital signature algorithms with a hidden group [PDF]

open access: yesComputer Science Journal of Moldova, 2023
The known designs of digital signature schemes with a hidden group, which use finite non-commutative algebras as algebraic support, are based on the computational complexity of the so-called hidden discrete logarithm problem.
Dmitriy N. Moldovyan
doaj   +1 more source

A Triple Unlocking Mechanism Model Against Forging Signature Attack Based on Multivariate Polynomial Public Key Cryptosystem

open access: yesIEEE Access, 2023
Since the original signature model did not account for the possible threat of the forging signature attack, the majority of existing multivariate polynomial public key based signature schemes are at risk of forging signatures by equivalent key attacks ...
Yongyan Hou   +4 more
doaj   +1 more source

Blockchain based system for transfer of funds through an e-Governance application [PDF]

open access: yesRevista Română de Informatică și Automatică, 2022
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI   +3 more
doaj   +1 more source

A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]

open access: yesEngineering and Technology Journal, 2010
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma   +1 more
doaj   +1 more source

Blockchain Technology – Support for Collaborative Systems [PDF]

open access: yesInformatică economică, 2020
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj   +1 more source

Smart Card-based Access Control System using Isolated Many-to-Many Authentication Scheme for Electric Vehicle Charging Stations

open access: yesJournal of ICT Research and Applications, 2023
In recent years, the Internet of Things (IoT) trend has been adopted very quickly. The rapid growth of IoT has increased the need for physical access control systems (ACS) for IoT devices, especially for IoT devices containing confidential data or other
Wervyan Shalannanda   +7 more
doaj   +1 more source

Public-Key Encryption with Quantum Keys

open access: yes, 2023
This submission subsumes arXiv:2303.01143 and arXiv:2303 ...
Khashayar Barooti   +6 more
openaire   +2 more sources

A Comparison on Broadcast Encryption Schemes: A New Broadcast Encryption Scheme

open access: yesAdvances in Electrical and Computer Engineering, 2020
In broadcast communication, the schemes in which encryption methods are employed are often used to transmit messages from a source to multiple users. There are three types of scheme categories: central, contributory and hybrid schemes.
BODUR, H., KARA, R.
doaj   +1 more source

Home - About - Disclaimer - Privacy