Results 51 to 60 of about 19,147 (192)

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

A Centralized Key Management Scheme Based on McEliece PKC for Space Network

open access: yesIEEE Access, 2020
Constrained by the limited resource, high-latency and high bit error rate, the existing group key management schemes for the space network are inefficient. To solve this problem, we proposed a centralized and identity-based key management scheme by using
Jie Liu   +4 more
doaj   +1 more source

AAβ-Cryptosystem: a chaos based public key cryptosystem [PDF]

open access: yes, 2009
We describe the AAβ-cryptosystem, a new public key cryptosystem that is built by utilizing the classical one-way chaotic beta-transformati on mapping given by by fβ=βx (mod 1). The AAb-cryptosystem represents its private keys as a vector dA and uses the
Kamel Ariffin, Muhammad Rezal   +1 more
core  

NTRU Lattice–Based Blockchain Consensus–Assisted Vehicle‐to‐Vehicle Authenticated Message Delivery in Internet of Vehicles

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 8, 25 May 2025.
Overview of blockchain supported multisignature algorithm for IoV. ABSTRACT The Internet of Vehicles (IoV) has emerged as a promising application capable of enhancing transportation efficiency and providing a variety of mobile services to drivers. This IoV enables real‐time data sharing among vehicles and infrastructure, allowing for better traffic ...
Dushyant Kumar Yadav   +3 more
wiley   +1 more source

A New "F-Lueg" Cryptosystem and its Security [PDF]

open access: yes, 2002
In this thesis, we present a new public-key cryptosystem and a new digital signature based on the extended Lucas function analogue to EIGamal cryptosystem. We name it" F-LUEG" cryptosystem. Chapter 2, we point out how an extended Lucas function can be
Choo, Mun Yoong
core  

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 5, May 2025.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

McEliece public key cryptosystem attack algorithm based on enumeration error vector

open access: yesTongxin xuebao, 2014
The research on the security of McEliece (M) public key cryptosystem was presented. The Hamming weight of error vector is less than the code length, and M public key cryptosystem based on Goppa code possesses low weight public code words. Considering the
Jing-mei LIU   +3 more
doaj   +2 more sources

A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later [PDF]

open access: yes, 2018
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is apparently new.
Stinson, Douglas R.
core   +1 more source

On improving security of GPT cryptosystems

open access: yes, 2009
The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding.
Gabidulin, Ernst M.   +2 more
core   +1 more source

Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain‐Based Intrusion Detection System for Smart Cities

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 36, Issue 4, April 2025.
Security is a crucial factor for information systems and other vital infrastructures. Ensuring robust security measures is imperative due to the substantial volume of network traffic. On the other side, many network components are susceptible to cyber threats and attacks owing to their inherent properties.
Fatima Al‐Quayed   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy