Results 71 to 80 of about 19,147 (192)
Aircraft Identification Scheme using Public-KeyCryptosystem
novel approach for identifying friend aircrafts from foe (IFF) using public-key cryptosystem is introduced. Tow schemes of public-key cryptosystem which provide higher security than convention(IFF) are presented computer simulation examples are also ...
Saad Mohammed kaliphs
doaj
Certificate integration management platform based on identity key
Asymmetric key cryptosystem plays an significant role in the field of information security.Compared with tra-ditional public key cryptosystem,the public key crypto system based on identity simplifies certificate management and reduces system ...
Mu-zhou LIU +5 more
doaj +2 more sources
On Decoding Schemes for the MDPC-McEliece Cryptosystem [PDF]
Recently, it has been shown how McEliece public-key cryptosystems based on moderate-density parity-check (MDPC) codes allow for very compact keys compared to variants based on other code families. In this paper, classical (iterative) decoding schemes for
Bartz, Hannes, Liva, Gianluigi
core +1 more source
THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj +1 more source
Author Correction: An image encryption scheme based on public key cryptosystem and quantum logistic map. [PDF]
Ye G, Jiao K, Huang X, Goi BM, Yap WS.
europepmc +1 more source
An efficient method to generate elliptic curves
In this paper, an efficient method to generate elliptic curves for public key cryptosystems based on discrete logarithm problem is presented. Usually, to resist possible attacks, such as MOV reduction, public key cryptosystems based on elliptic curve E ...
ZHOU Chang-ying1 +2 more
doaj +2 more sources
An improved signature model of multivariate polynomial public key cryptosystem to resist the key recovery attack is presented in this paper. Two pairs of public keys are added to design new authentication conditionals for public keys, and then the ...
Xin Wang, Bo Yang
doaj +1 more source
Analisys of Lattice-based Public Key Cryptosystems
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj
A random number generator based on NTRU cryptosystem [PDF]
A random number generator based on the operation of the NTRU cryptosystem is proposed. By using the proposed generator together with the NTRU cryptosystem, we can save hardware and software components.
He Debiao
doaj
The GH Public-Key Cryptosystem [PDF]
This paper will propose an efficient algorithm that utilizes the signed-digit representation to compute the kth term of a characteristic sequence generated by a linear feedback shift register of order 3 over GF(q). We will also propose an efficient algorithm to compute the (h-dk)th term of the characteristic sequence based on the knowledge of the kth ...
Guang Gong, Lein Harn, Huapeng Wu
openaire +1 more source

