Results 141 to 150 of about 19,147 (192)
A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy. [PDF]
Silva-García VM +2 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Quantum Public-Key Cryptosystem
International Journal of Theoretical Physics, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Luo, Ming-Xing +3 more
openaire +1 more source
Coalition Public-Key Cryptosystems
Cybernetics and Systems Analysis, 2001A coalition is understood to be a group of participants (coalitionists) who can collaborate in order to achieve common objectives. The basic principle of a coalition is the absence of a threat to communication flows within the coalition from its participants. In this paper, two new RSA coalition protocols are considered. According to the first protocol,
openaire +1 more source
Complexity Measures for Public-Key Cryptosystems
SIAM Journal on Computing, 1988A general theory of public-key cryptography is developed that is based on the mathematical framework of complexity theory. Two related approaches are taken to the development of this theory, and these approaches correspond to different but equivalent formulations of the problem of cracking a public-key cryptosystem (PKCS).
Grollmann, Joachim, Selman, Alan L.
openaire +2 more sources
Stateful public-key cryptosystems
Proceedings of the 13th ACM conference on Computer and communications security, 2006We show how to significantly speed-up the encryption portion of some public-key cryptosystems by the simple expedient of allowing a sender to maintain state that is re-used across different encryptions.In particular we present stateful versions of the DHIES and Kurosawa-Desmedt schemes that each use only 1 exponentiation to encrypt, as opposed to 2 and
Mihir Bellare +2 more
openaire +1 more source
2003
In 1976 Diffie and Hellman [152] described the framework for public-key cryptography. It was not until 1978 that three designs for public-key cryptosystems were published. Rivest, Shamir, and Adleman [431] showed how the discrete logarithm and factorization problems could be used to construct a public-key cryptosystem.
Josef Pieprzyk +2 more
openaire +1 more source
In 1976 Diffie and Hellman [152] described the framework for public-key cryptography. It was not until 1978 that three designs for public-key cryptosystems were published. Rivest, Shamir, and Adleman [431] showed how the discrete logarithm and factorization problems could be used to construct a public-key cryptosystem.
Josef Pieprzyk +2 more
openaire +1 more source
Vulnerable Public Keys in NTRU Cryptosystem
Chinese Annals of Mathematics, Series B, 2020zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Liqing +3 more
openaire +2 more sources
International Journal of Systems Science, 1990
Abstract The development of a new public-key cryptosystem is discussed. This system is a hybrid combination of the RSA (Rivest-Shamir-Adleman) and knapsack crypto-systems. The message is encrypted in two stages using the knapsack algorithm followed by the RSA algorithm, and then decrypted in reverse order.
SAAD M. KALlPHA +2 more
openaire +1 more source
Abstract The development of a new public-key cryptosystem is discussed. This system is a hybrid combination of the RSA (Rivest-Shamir-Adleman) and knapsack crypto-systems. The message is encrypted in two stages using the knapsack algorithm followed by the RSA algorithm, and then decrypted in reverse order.
SAAD M. KALlPHA +2 more
openaire +1 more source
Quaternion public key cryptosystems
2016 World Congress on Industrial Control Systems Security (WCICSS), 2016In this paper, quaternion key exchange protocol and quaternion public key encryption scheme are proposed. The security of proposals relies on hardness of the hidden quaternion conjugacy search problem, that is, difficulty of solving the simultaneous quaternion discrete logarithmic problem and quaternion conjugacy search problem over quaternion rings ...
Maheswara Rao Valluri +1 more
openaire +1 more source
A Survey of Public-Key Cryptosystems
SIAM Review, 2004The authors not only provide an overview of the best public-key ciphers, but also show how difficult a task it is to rank such cryptosystems. Their list of references is extensive with 124 items for further reading. Anyone interested in this topic should have a look at this paper.
Koblitz, Neal, Menezes, Alfred J.
openaire +2 more sources

