Results 1 to 10 of about 781,013 (364)

Probability theory and public-key cryptography [PDF]

open access: yesarXiv, 2020
In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.
Bessonov, Mariya   +2 more
arxiv   +9 more sources

Public Key Cryptography based on Semigroup Actions [PDF]

open access: green, 2007
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve.
Maze, G., Monico, C., Rosenthal, J.
core   +3 more sources

Public key cryptography and error correcting codes as Ising models [PDF]

open access: green, 2000
We employ the methods of statistical physics to study the performance of Gallager type error-correcting codes. In this approach, the transmitted codeword comprises Boolean sums of the original message bits selected by two randomly-constructed sparse ...
Kabashima, Yoshiyuki   +2 more
core   +2 more sources

Applications of single-qubit rotations in quantum public-key cryptography [PDF]

open access: green, 2008
We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum ...
A. Kawachi   +3 more
core   +2 more sources

Computational Thinking Enrichment: Public-Key Cryptography [PDF]

open access: diamondInformatics in Education, 2018
The Computer Science Unplugged activities and project has been an influential STEM (Science, Technology, Engineering & Mathematics) initiative, providing enrichment and teaching activities supporting computational thinking.
Frances ROSAMOND
doaj   +2 more sources

Public-Key Cryptography Based on Tropical Circular Matrices [PDF]

open access: goldApplied Sciences, 2022
Some public-key cryptosystems based on the tropical semiring have been proposed in recent years because of their increased efficiency, since the multiplication is actually an ordinary addition of numbers and there is no ordinary multiplication of numbers
Huawei Huang, Chunhua Li, Lunzhi Deng
doaj   +2 more sources

A SAT-based Public Key Cryptography Scheme [PDF]

open access: greenarXiv, 2015
A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is proposed. The public key is a SAT formula satisfied by the private key. Probabilistic encryption generates functions implied to be false by the public key XOR the message bits. A zero-knowledge proof is used to provide signatures.
Sebastian E. Schmittner
arxiv   +3 more sources

Public-key cryptography and invariant theory [PDF]

open access: yesarXiv, 2002
Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of the known cryptosystems which involve groups.
Grigoriev, D.
arxiv   +3 more sources

Public-key cryptography and invariant theory [PDF]

open access: greenJournal of Mathematical Sciences, 2005
Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of the known cryptosystems which involve groups.
Dima Grigoriev
openalex   +7 more sources

Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures [PDF]

open access: goldIET Information Security, 2021
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy