-
221
Efficient certificateless multi-receiver anonymous signcryption scheme
Published 2016-06-01Subjects: “…certificateless cryptography…”
Get full text
Article -
222
A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks
Published 2024-06-01Subjects: “…cryptography…”
Get full text
Article -
223
Legal Status of Voters and Observers in the Remote Electronic Voting System in Russia
Published 2024-04-01Subjects: Get full text
Article -
224
Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection
Published 2013-01-01Subjects: “…cryptography…”
Get full text
Article -
225
Predictions for 2025: Artificial Intelligence in Modern Drug Development, Quantum Proof Encryption, and Health Data Monetization
Published 2024-12-01Subjects: Get full text
Article -
226
On the Security of Certificateless Signature Schemes
Published 2013-06-01“…Certificateless public key cryptography (CL-PKC) deals effectively with the twin issues of certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography. …”
Get full text
Article -
227
RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext
Published 2022-12-01“…Furthermore, public key cryptography is the type of cryptography that using two interrelated keys, namely the public and private keys. …”
Get full text
Article -
228
ECC fault attack algorithm based on Grover's quantum search algorithm with 0.1π phase rotation
Published 2017-08-01“…The Grover's a1gorithm was used for fau1t attack against the pub1ic key cryptography.A fixed phase rotation based Grover's a1gorithm was proposed,and the probabi1ity of success achieved 99.23% with 0.1π phase rotation.Combined with the fau1t attack further,ECC(e11iptic curve cryptography)vo1tage burr attack a1gorithm based on Grover a1gorithm with 0.1π phase rotation was proposed.Then a safety Kob1itz curve,K-163,pub1ished successfu11y attacked by NIST on binary domain in simu1ation and the success rate was 100%.The comp1exity of the attack great1y reduces on the exponentia1.It was a new effective way,except the Shor's a1gorithm,to attack pub1ic key cryptography by quantum computing,and it contributed to extend the attack ways to the other pub1ic key cryptography.…”
Get full text
Article -
229
Security analysis and improvement of a certificateless signcryption scheme
Published 2015-03-01“…To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography.Recently,Zhu et al.proposed a certificateless signcryption without bilinear pairings.However, their scheme was completely insecure against with two concrete attacks. …”
Get full text
Article -
230
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
Published 2024-12-01Get full text
Article -
231
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
Published 2014-01-01Get full text
Article -
232
Shaping the future of commercial quantum computer and the challenge for information security
Published 2016-03-01“…Additionally, it was the first time to use the quantum computer for designing cryptography and it shed an interesting light on cryptography design based on the quantum artificial intelligence which had not been reported anywhere before.…”
Get full text
Article -
233
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
Published 2019-04-01Get full text
Article -
234
Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish
Published 2019-12-01“…Dibangun berbasis desktop. Abstract Cryptography (cryptography) is a data security process to keep messages (files) from being "disturbed" by third parties. …”
Get full text
Article -
235
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Published 2024-08-01Get full text
Article -
236
Image Encryption Using a Lightweight Stream Encryption Algorithm
Published 2012-01-01Get full text
Article -
237
Some Graph-Based Encryption Schemes
Published 2021-01-01“…In today’s technological world, confidentiality is an important issue to deal with, and it is carried out through different proficiencies. Cryptography is a scientific technique of securing a communication from unauthenticated approach. …”
Get full text
Article -
238
Certificateless signature scheme without bilinear pairings
Published 2012-04-01“…To solve the key escrow problem inherited in ID-based cryptography and the complex certificate management problem of traditional certification-based public key cryptosystem,Al-Riyami and Paterson proposed the novel concept of certificateless public key cryptography.Almost all existing certificateless signature schemes need bilinear pairings either during signature generation stage or the signature verification stage,and were proven secure only with stronger computational assumptions.A new certificateless signature scheme without pairings was proposed.The scheme is provably secure in the random oracle model(ROM)under the relatively weaker assumption,i.e.…”
Get full text
Article -
239
-
240
Synthesis of symmetric paths of arbiter physically unclonable function on FPGA
Published 2019-06-01“…Physical cryptography is one of the current trends among the existing methods of protecting digital devices from illegal access. …”
Get full text
Article