Results 11 to 20 of about 507,576 (358)

Public key cryptography and error correcting codes as Ising models [PDF]

open access: green, 2001
We employ the methods of statistical physics to study the performance of Gallager type error-correcting codes. In this approach, the transmitted codeword comprises Boolean sums of the original message bits selected by two randomly-constructed sparse ...
David Saad
openalex   +3 more sources

Public Key Cryptography based on Semigroup Actions [PDF]

open access: green, 2005
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve.
Gkrard Maze   +2 more
openalex   +4 more sources

Applications of single-qubit rotations in quantum public-key cryptography [PDF]

open access: green, 2008
We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum ...
Georgios M. Nikolopoulos
openalex   +3 more sources

Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes

open access: yesIET Information Security, 2021
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh   +3 more
doaj   +1 more source

On Multiple Encryption for Public-Key Cryptography

open access: yesCryptography, 2023
Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due to ...
Tudor Soroceanu   +2 more
doaj   +1 more source

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

Lattice‐based cryptosystems in standardisation processes: A survey

open access: yesIET Information Security, 2023
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj   +1 more source

Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status

open access: yesIEEE Access, 2021
The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security.
Raza Imam   +3 more
doaj   +1 more source

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

open access: yesIACR Cryptology ePrint Archive, 2020
. Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years,
Yudi Zhang   +4 more
semanticscholar   +1 more source

Lossless and Reversible Data Hiding using Public Key Cryptography [PDF]

open access: yesITM Web of Conferences, 2020
In today’s world, the internet is a platform, where large amount of data can be obtained and transferred. Different technologies and internet access are used to transfer the data which can be accessed by authorized and unauthorized users.The major ...
Shetye Pooja   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy