Results 51 to 60 of about 19,147 (192)
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci +7 more
wiley +1 more source
A Centralized Key Management Scheme Based on McEliece PKC for Space Network
Constrained by the limited resource, high-latency and high bit error rate, the existing group key management schemes for the space network are inefficient. To solve this problem, we proposed a centralized and identity-based key management scheme by using
Jie Liu +4 more
doaj +1 more source
AAβ-Cryptosystem: a chaos based public key cryptosystem [PDF]
We describe the AAβ-cryptosystem, a new public key cryptosystem that is built by utilizing the classical one-way chaotic beta-transformati on mapping given by by fβ=βx (mod 1). The AAb-cryptosystem represents its private keys as a vector dA and uses the
Kamel Ariffin, Muhammad Rezal +1 more
core
Overview of blockchain supported multisignature algorithm for IoV. ABSTRACT The Internet of Vehicles (IoV) has emerged as a promising application capable of enhancing transportation efficiency and providing a variety of mobile services to drivers. This IoV enables real‐time data sharing among vehicles and infrastructure, allowing for better traffic ...
Dushyant Kumar Yadav +3 more
wiley +1 more source
A New "F-Lueg" Cryptosystem and its Security [PDF]
In this thesis, we present a new public-key cryptosystem and a new digital signature based on the extended Lucas function analogue to EIGamal cryptosystem. We name it" F-LUEG" cryptosystem. Chapter 2, we point out how an extended Lucas function can be
Choo, Mun Yoong
core
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma +3 more
wiley +1 more source
McEliece public key cryptosystem attack algorithm based on enumeration error vector
The research on the security of McEliece (M) public key cryptosystem was presented. The Hamming weight of error vector is less than the code length, and M public key cryptosystem based on Goppa code possesses low weight public code words. Considering the
Jing-mei LIU +3 more
doaj +2 more sources
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later [PDF]
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is apparently new.
Stinson, Douglas R.
core +1 more source
On improving security of GPT cryptosystems
The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding.
Gabidulin, Ernst M. +2 more
core +1 more source
Security is a crucial factor for information systems and other vital infrastructures. Ensuring robust security measures is imperative due to the substantial volume of network traffic. On the other side, many network components are susceptible to cyber threats and attacks owing to their inherent properties.
Fatima Al‐Quayed +5 more
wiley +1 more source

