Results 71 to 80 of about 19,193 (189)
Certificate integration management platform based on identity key
Asymmetric key cryptosystem plays an significant role in the field of information security.Compared with tra-ditional public key cryptosystem,the public key crypto system based on identity simplifies certificate management and reduces system ...
Mu-zhou LIU +5 more
doaj +2 more sources
THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj +1 more source
Author Correction: An image encryption scheme based on public key cryptosystem and quantum logistic map. [PDF]
Ye G, Jiao K, Huang X, Goi BM, Yap WS.
europepmc +1 more source
An efficient method to generate elliptic curves
In this paper, an efficient method to generate elliptic curves for public key cryptosystems based on discrete logarithm problem is presented. Usually, to resist possible attacks, such as MOV reduction, public key cryptosystems based on elliptic curve E ...
ZHOU Chang-ying1 +2 more
doaj +2 more sources
A Quantum Public-Key Cryptosystem with Reusable Keys Using Entangled States
In most traditional quantum public-key cryptosystems, the public key held by the key management center (KMC) is a group of quantum systems. The public key is destroyed after a secret communication process, and so users must reconstruct the public key ...
Xiaoyu Li, Yue Zhou
doaj +1 more source
Analisys of Lattice-based Public Key Cryptosystems
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj
A random number generator based on NTRU cryptosystem [PDF]
A random number generator based on the operation of the NTRU cryptosystem is proposed. By using the proposed generator together with the NTRU cryptosystem, we can save hardware and software components.
He Debiao
doaj
Security of the cryptosystems based on ergodic matrices
The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved ...
Hua-wei HUANG +3 more
doaj +2 more sources
The GH Public-Key Cryptosystem [PDF]
This paper will propose an efficient algorithm that utilizes the signed-digit representation to compute the kth term of a characteristic sequence generated by a linear feedback shift register of order 3 over GF(q). We will also propose an efficient algorithm to compute the (h-dk)th term of the characteristic sequence based on the knowledge of the kth ...
Guang Gong, Lein Harn, Huapeng Wu
openaire +1 more source
Electronic health information exchange (HIE) allows doctors, nurses, pharmacists, other health care providers and patients to appropriately access and securely share a patient’s vital medical information electronically—improving the speed, quality ...
Hailong Yu +3 more
doaj +1 more source

