Results 21 to 30 of about 124,822 (278)

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

Decryption speed up of ElGamal with composite modulus.

open access: yesPLoS ONE, 2020
Public key cryptosystems such as RSA, rebalanced RSA and ElGamal have the disadvantage of serious asymmetry between encryption and decryption speed.
GyuChol Kim, SuChol Li
doaj   +1 more source

CCA-Secure Deterministic Identity-Based Encryption Scheme [PDF]

open access: yesJournal of Universal Computer Science, 2019
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized ...
Meijuan Huang   +5 more
doaj   +3 more sources

Provably sender-deniable encryption scheme [PDF]

open access: yesComputer Science Journal of Moldova, 2015
The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption. In the proposed new sender-deniable encryption scheme the cryptogram is computed as coefficients of quadratic congruence, the
N.A. Moldovyan   +2 more
doaj  

Public Key Image Encryption Based on Compressed Sensing

open access: yesIEEE Access, 2019
The compression feature of compressed sensing (CS) enables that the ciphertext lengths of multimedia encryption schemes have reduced dramatically, and the simple linear measurements make the encryption process extremely efficient.
Dong Xie
doaj   +1 more source

Secure and linear cryptosystems using error-correcting codes [PDF]

open access: yes, 2000
A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented.
Cover T. M.   +9 more
core   +2 more sources

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise

open access: yesIEEE Access, 2018
To protect cyber security and privacy, it is critical to design security and practical public key encryption schemes. Today, big data and cloud computing bring not only unprecedented opportunities but also fundamental security challenges.
Zhimin Yu   +4 more
doaj   +1 more source

Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes

open access: yes, 2017
Encryption schemes based on the rank metric lead to small public key sizes of order of few thousands bytes which represents a very attractive feature compared to Hamming metric-based encryption schemes where public key sizes are of order of hundreds of ...
Gaborit, Philippe   +2 more
core   +3 more sources

Related Randomness Attacks for Public Key Encryption [PDF]

open access: yes, 2014
. Several recent and high-profile incidents give cause to believe that randomness failures of various kinds are endemic in deployed cryptographic systems.
Paterson, Kenneth G.   +2 more
core   +2 more sources

Public Key Encryption with Secure Key Leasing

open access: yes, 2023
68 pages, 4 figures. added related works and a comparison with a concurrent work (2023-04-07)
Agrawal, Shweta   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy