Results 71 to 80 of about 835,298 (263)

Multivariate Quadratic Equations in Public-key Cryptography

open access: yesБезопасность информационных технологий, 2013
The work is dedicated to appliances of multivariate quadratic equations in modern public-key cryptography. The existing cryptosystems are reviewed, pointing out their pros and contras.
Andrey Valerievich Zhatkin
doaj  

Exploring the fusion of lattice‐based quantum key distribution for secure Internet of Things communications

open access: yesIET Quantum Communication
The integration of lattice‐based cryptography principles with Quantum Key Distribution (QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) ecosystems.
Sujit Biswas   +4 more
doaj   +1 more source

A public key cryptography using multinacci block matrices [PDF]

open access: yesarXiv, 2020
In this paper, we have proposed a public key cryptography using recursive block matrices involving generalized Fibonacci numbers over a finite field Fp. For this, we define multinacci block matrices, a type of upper triangular matrix involving multinacci matrices at diagonal places and obtained some of its algebraic properties. Moreover, we have set up
arxiv  

Analisis Dan Implementasi Algoritma Kriptografi Kunci Publik Rsa Dan Luc Untuk Penyandian Data [PDF]

open access: yes, 2015
The use of data communication networks between various computer systems have developed rapidly in various fields, so that the necessary existence of other systems maintain the confidentiality and security of data exchange.In handling the security and ...
Setiaji, B. (Bayu)
core  

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Cryptanalysis and improvement of an efficient certificateless signature scheme

open access: yes, 2008
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced.
Huang, Xinyi, Li, Jiguo, Mu, Yi, Wu, Wei
core   +1 more source

Discovery of Elliptic Curve Cryptographic Private Key in O(n) [PDF]

open access: yesarXiv, 2009
An algorithm is presented that in context of public key use of Elliptic Curve Cryptography allows discovery of the private key in worst case O(n).
arxiv  

Quantum Key Distribution for V2I communications with software‐defined networking

open access: yesIET Quantum Communication
The evolution of Connected and Autonomous Vehicles (CAVs) promises improvements in our travel experience and the potential to enhance road safety and reduce environmental impact.
Alexandros Stavdas   +9 more
doaj   +1 more source

A Matrix Public Key Cryptosystem [PDF]

open access: yesarXiv, 2015
We discuss a matrix public key cryptosystem and its numerical implementation.
arxiv  

Combinatorial group theory and public key cryptography

open access: yes, 2004
After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that the conjugacy search problem is unlikely to provide sufficient level of security if a ...
Shpilrain, Vladimir, Zapata, Gabriel
core   +2 more sources

Home - About - Disclaimer - Privacy