Showing 21 - 40 results of 96 for search '"cryptosystems"', query time: 0.05s Refine Results
  1. 21

    McEliece public key cryptosystem attack algorithm based on enumeration error vector by Jing-mei LIU, Yan-li WANG, Bin LIANG, Lin-sen ZHAO

    Published 2014-05-01
    “…The research on the security of McEliece (M) public key cryptosystem was presented. The Hamming weight of error vector is less than the code length, and M public key cryptosystem based on Goppa code possesses low weight public code words. …”
    Get full text
    Article
  2. 22

    A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform by Srinivas Koppu, V. Madhu Viswanatham

    Published 2017-01-01
    “…An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. …”
    Get full text
    Article
  3. 23

    High-Level Design and Implementation of a Configurable Cryptosystem With a Novel Chaos-Enhanced Function by Medien Zeghid, Hassan Yousif Ahmed, Akhtar Nawaz Khan

    Published 2025-01-01
    “…Additionally, we present a high-level design and implementation of a configurable cryptosystem using SystemC. The configurable design allows for flexibility in integrating different ciphers and adapting to evolving security needs.…”
    Get full text
    Article
  4. 24

    Security analysis of public-key cryptosystems based on matrix action problem against quantum attack by Huawei HUANG

    Published 2023-03-01
    “…As a generalization of the discrete logarithm problem, semigroup action problem has important applications in the design of public-key cryptography.Public-key cryptosystems based on action problem of integer matrix semigroups on the direct product of commutative groups were analyzed.The matrix was regarded as the exponent of direct product elements, and this class of matrix action had the exponential rules similar to group.It was proved that if the matrix action was injective or the number of generators of the hidden subgroup was less than or equal to the square of the order of the matrix, the matrix action problem could be reduced in polynomial time to the hidden subgroup problem of the direct sum of the additive group of the matrices.And it was proved that commutative matrix action problem could also be reduced to hidden subgroup problem of the direct sum of the additive group of the matrices in polynomial time.The cryptosystems based on this class of matrix action problem cannot against quantum attacks.This conclusion has theoretical significance in the design of public-key cryptography against quantum attacks.…”
    Get full text
    Article
  5. 25
  6. 26
  7. 27

    An efficient method to generate elliptic curves by ZHOU Chang-ying1, Kwok-Yan-Lam1, ZHOU Zheng-ou2

    Published 2001-01-01
    Subjects: “…public key cryptosystem…”
    Get full text
    Article
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33

    Chosen message attacks method against ECC implementations by Peng LUO, Hui-yun LI, Kun-peng WANG, Ya-wei WANG

    Published 2014-05-01
    Subjects: “…Elliptic curve cryptosystem…”
    Get full text
    Article
  14. 34

    Proxy re-signature scheme based on isomorphisms of polynomial by Hui-xian LI, Lu SHAO, Liao-jun PANG

    Published 2017-02-01
    Subjects: “…multivariate public key cryptosystem…”
    Get full text
    Article
  15. 35

    Pseudo 4D projective coordinate-based multi-base scalar multiplication by Ming XU, Liang SHI

    Published 2018-05-01
    Subjects: “…elliptic curve cryptosystem…”
    Get full text
    Article
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40

    Security on a cryptographic model based on chaos by WEI Jun1, LIAO Xiao-feng2, YANG Ji-yun2

    Published 2008-01-01
    “…The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these cryptosystems.Attack and corre-sponding improvement were deployed based on the model.The research is validated with a cryptanalysis on a chaotic en-cryption scheme presented by LI S J in Physics Letters A.…”
    Get full text
    Article