Results 21 to 30 of about 16,729,036 (330)

Public Key Encryption with Secure Key Leasing

open access: yes, 2023
68 pages, 4 figures. added related works and a comparison with a concurrent work (2023-04-07)
Agrawal, Shweta   +4 more
openaire   +2 more sources

Public Key Cryptography based on Semigroup Actions [PDF]

open access: yes, 2007
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve.
Maze, G., Monico, C., Rosenthal, J.
core   +1 more source

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing

open access: yesIEEE Access, 2020
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso   +4 more
doaj   +1 more source

Public Key Exchange Using Matrices Over Group Rings [PDF]

open access: yes, 2013
We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices over a group ring of a (small) symmetric group as the platform.
Kahrobaei, Delaram   +2 more
core   +2 more sources

On the issue of the blockchain technology perspectives. The more things change, the more they stay the same

open access: yesБезопасность информационных технологий, 2018
Blockchain technologies (BC) are immutable distributed systems of digital ledgers (i.e., without central repository) and, as rule, without central authority. Currently, there is a lot of excitement around the use of BC technology, although the technology
Vladimir I. Budzko, Dmitry A. Melnikov
doaj   +1 more source

A practical digital signature scheme based on the hidden logarithm problem [PDF]

open access: yesComputer Science Journal of Moldova, 2021
A candidate for practical post-quantum digital signature algorithm based on computational difficulty of the hidden discrete logarithm problem is introduced.
D.N. Moldovyan
doaj  

Public Key Cipher with Signature Based on Diffie-Hellman and the Magic Square Problem [PDF]

open access: yesEngineering and Technology Journal, 2016
In the present paper, wedeveloped a new variant of asymmetric cipher (Public Key) algorithm based on the Discrete Logarithm Problem (DLP) uses Diffie-Hellman key exchange protocol and the mathematical features of magic square.
Abdul S.Rahma   +2 more
doaj   +1 more source

Karatsuba-Ofman Multiplier with Integrated Modular Reduction for GF(2m)

open access: yesAdvances in Electrical and Computer Engineering, 2013
In this paper a novel GF(2m) multiplier based on Karatsuba-Ofman Algorithm is presented. A binary field multiplication in polynomial basis is typically viewed as a two steps process, a polynomial multiplication followed by a modular reduction step ...
CUEVAS-FARFAN, E.   +6 more
doaj   +1 more source

Improved Homomorphic Discrete Fourier Transforms and FHE Bootstrapping

open access: yesIEEE Access, 2019
Homomorphic encryption (HE), which enables computation on ciphertexts without any leakage, rise as a most promising solution for privacy-preserving data processing, including secure machine learning and secure out-sourcing computation.
Kyoohyung Han   +2 more
doaj   +1 more source

Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]

open access: yes, 2003
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad   +17 more
core   +2 more sources

Home - About - Disclaimer - Privacy