Results 71 to 80 of about 19,147 (192)

Aircraft Identification Scheme using Public-KeyCryptosystem

open access: yesJournal of Engineering and Sustainable Development, 2005
novel approach for identifying friend aircrafts from foe (IFF) using public-key cryptosystem is introduced. Tow schemes of public-key cryptosystem which provide higher security than convention(IFF) are presented computer simulation examples are also ...
Saad Mohammed kaliphs
doaj  

Certificate integration management platform based on identity key

open access: yesTongxin xuebao, 2016
Asymmetric key cryptosystem plays an significant role in the field of information security.Compared with tra-ditional public key cryptosystem,the public key crypto system based on identity simplifies certificate management and reduces system ...
Mu-zhou LIU   +5 more
doaj   +2 more sources

On Decoding Schemes for the MDPC-McEliece Cryptosystem [PDF]

open access: yes, 2018
Recently, it has been shown how McEliece public-key cryptosystems based on moderate-density parity-check (MDPC) codes allow for very compact keys compared to variants based on other code families. In this paper, classical (iterative) decoding schemes for
Bartz, Hannes, Liva, Gianluigi
core   +1 more source

THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2011
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj   +1 more source

An efficient method to generate elliptic curves

open access: yesTongxin xuebao, 2001
In this paper, an efficient method to generate elliptic curves for public key cryptosystems based on discrete logarithm problem is presented. Usually, to resist possible attacks, such as MOV reduction, public key cryptosystems based on elliptic curve E ...
ZHOU Chang-ying1   +2 more
doaj   +2 more sources

An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack

open access: yesMathematical Biosciences and Engineering, 2019
An improved signature model of multivariate polynomial public key cryptosystem to resist the key recovery attack is presented in this paper. Two pairs of public keys are added to design new authentication conditionals for public keys, and then the ...
Xin Wang, Bo Yang
doaj   +1 more source

Analisys of Lattice-based Public Key Cryptosystems

open access: yesБезопасность информационных технологий, 2011
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj  

A random number generator based on NTRU cryptosystem [PDF]

open access: yesMaejo International Journal of Science and Technology, 2010
A random number generator based on the operation of the NTRU cryptosystem is proposed. By using the proposed generator together with the NTRU cryptosystem, we can save hardware and software components.
He Debiao
doaj  

The GH Public-Key Cryptosystem [PDF]

open access: yes, 2001
This paper will propose an efficient algorithm that utilizes the signed-digit representation to compute the kth term of a characteristic sequence generated by a linear feedback shift register of order 3 over GF(q). We will also propose an efficient algorithm to compute the (h-dk)th term of the characteristic sequence based on the knowledge of the kth ...
Guang Gong, Lein Harn, Huapeng Wu
openaire   +1 more source

Home - About - Disclaimer - Privacy