Results 71 to 80 of about 19,193 (189)

Certificate integration management platform based on identity key

open access: yesTongxin xuebao, 2016
Asymmetric key cryptosystem plays an significant role in the field of information security.Compared with tra-ditional public key cryptosystem,the public key crypto system based on identity simplifies certificate management and reduces system ...
Mu-zhou LIU   +5 more
doaj   +2 more sources

THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2011
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj   +1 more source

An efficient method to generate elliptic curves

open access: yesTongxin xuebao, 2001
In this paper, an efficient method to generate elliptic curves for public key cryptosystems based on discrete logarithm problem is presented. Usually, to resist possible attacks, such as MOV reduction, public key cryptosystems based on elliptic curve E ...
ZHOU Chang-ying1   +2 more
doaj   +2 more sources

A Quantum Public-Key Cryptosystem with Reusable Keys Using Entangled States

open access: yesApplied Sciences
In most traditional quantum public-key cryptosystems, the public key held by the key management center (KMC) is a group of quantum systems. The public key is destroyed after a secret communication process, and so users must reconstruct the public key ...
Xiaoyu Li, Yue Zhou
doaj   +1 more source

Analisys of Lattice-based Public Key Cryptosystems

open access: yesБезопасность информационных технологий, 2011
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj  

A random number generator based on NTRU cryptosystem [PDF]

open access: yesMaejo International Journal of Science and Technology, 2010
A random number generator based on the operation of the NTRU cryptosystem is proposed. By using the proposed generator together with the NTRU cryptosystem, we can save hardware and software components.
He Debiao
doaj  

Security of the cryptosystems based on ergodic matrices

open access: yesTongxin xuebao, 2015
The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved ...
Hua-wei HUANG   +3 more
doaj   +2 more sources

The GH Public-Key Cryptosystem [PDF]

open access: yes, 2001
This paper will propose an efficient algorithm that utilizes the signed-digit representation to compute the kth term of a characteristic sequence generated by a linear feedback shift register of order 3 over GF(q). We will also propose an efficient algorithm to compute the (h-dk)th term of the characteristic sequence based on the knowledge of the kth ...
Guang Gong, Lein Harn, Huapeng Wu
openaire   +1 more source

A new robust PKC encryption method based on invertible matrix multiplication for HIE in medical IoT systems

open access: yesCybersecurity
Electronic health information exchange (HIE) allows doctors, nurses, pharmacists, other health care providers and patients to appropriately access and securely share a patient’s vital medical information electronically—improving the speed, quality ...
Hailong Yu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy