Results 21 to 30 of about 16,729,036 (330)
Public Key Encryption with Secure Key Leasing
68 pages, 4 figures. added related works and a comparison with a concurrent work (2023-04-07)
Agrawal, Shweta +4 more
openaire +2 more sources
Public Key Cryptography based on Semigroup Actions [PDF]
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve.
Maze, G., Monico, C., Rosenthal, J.
core +1 more source
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso +4 more
doaj +1 more source
Public Key Exchange Using Matrices Over Group Rings [PDF]
We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices over a group ring of a (small) symmetric group as the platform.
Kahrobaei, Delaram +2 more
core +2 more sources
Blockchain technologies (BC) are immutable distributed systems of digital ledgers (i.e., without central repository) and, as rule, without central authority. Currently, there is a lot of excitement around the use of BC technology, although the technology
Vladimir I. Budzko, Dmitry A. Melnikov
doaj +1 more source
A practical digital signature scheme based on the hidden logarithm problem [PDF]
A candidate for practical post-quantum digital signature algorithm based on computational difficulty of the hidden discrete logarithm problem is introduced.
D.N. Moldovyan
doaj
Public Key Cipher with Signature Based on Diffie-Hellman and the Magic Square Problem [PDF]
In the present paper, wedeveloped a new variant of asymmetric cipher (Public Key) algorithm based on the Discrete Logarithm Problem (DLP) uses Diffie-Hellman key exchange protocol and the mathematical features of magic square.
Abdul S.Rahma +2 more
doaj +1 more source
Karatsuba-Ofman Multiplier with Integrated Modular Reduction for GF(2m)
In this paper a novel GF(2m) multiplier based on Karatsuba-Ofman Algorithm is presented. A binary field multiplication in polynomial basis is typically viewed as a two steps process, a polynomial multiplication followed by a modular reduction step ...
CUEVAS-FARFAN, E. +6 more
doaj +1 more source
Improved Homomorphic Discrete Fourier Transforms and FHE Bootstrapping
Homomorphic encryption (HE), which enables computation on ciphertexts without any leakage, rise as a most promising solution for privacy-preserving data processing, including secure machine learning and secure out-sourcing computation.
Kyoohyung Han +2 more
doaj +1 more source
Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad +17 more
core +2 more sources

