Cryptographic key generation using deep learning with biometric face and finger vein data. [PDF]
Gizachew Yirga T +2 more
europepmc +1 more source
Information-set decoding for convolutional codes. [PDF]
Gassner N +3 more
europepmc +1 more source
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure. [PDF]
Kara M, Hammoudeh M, Alamri A, Alamri S.
europepmc +1 more source
A novel development to encrypt data communication under t-intuitionistic fuzzy environment. [PDF]
Alolaiyan H +4 more
europepmc +1 more source
A novel method for generating public keys involving matrix operations. [PDF]
Sun X, Han J, Lv B, Sun C, Zeng C.
europepmc +1 more source
On Multivariate Public-Key Cryptosystems
Nowadays cryptographic technologies are widely used in the information society. The theme of this paper is public-key cryptosystems (PKCs). PKCs are systems which need two separate keys: a public-key and a secret-key. This system is one of the most powerful tools in modern cryptography. One of the typical applications of PKCs is public-key encryptions,
openaire
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing. [PDF]
Zhao M, Chen H.
europepmc +1 more source
A novel Chua's based 2-D chaotic system and its performance analysis in cryptography. [PDF]
Rasappan S +5 more
europepmc +1 more source
Efficient ring signature for cross-chain data sharing in blockchain-enabled cold-chain logistics system. [PDF]
Zhang Y, Tang Y, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Secure computation protocol of Chebyshev distance under the malicious model. [PDF]
Liu X +7 more
europepmc +1 more source

