-
21
McEliece public key cryptosystem attack algorithm based on enumeration error vector
Published 2014-05-01“…The research on the security of McEliece (M) public key cryptosystem was presented. The Hamming weight of error vector is less than the code length, and M public key cryptosystem based on Goppa code possesses low weight public code words. …”
Get full text
Article -
22
A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform
Published 2017-01-01“…An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. …”
Get full text
Article -
23
High-Level Design and Implementation of a Configurable Cryptosystem With a Novel Chaos-Enhanced Function
Published 2025-01-01“…Additionally, we present a high-level design and implementation of a configurable cryptosystem using SystemC. The configurable design allows for flexibility in integrating different ciphers and adapting to evolving security needs.…”
Get full text
Article -
24
Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
Published 2023-03-01“…As a generalization of the discrete logarithm problem, semigroup action problem has important applications in the design of public-key cryptography.Public-key cryptosystems based on action problem of integer matrix semigroups on the direct product of commutative groups were analyzed.The matrix was regarded as the exponent of direct product elements, and this class of matrix action had the exponential rules similar to group.It was proved that if the matrix action was injective or the number of generators of the hidden subgroup was less than or equal to the square of the order of the matrix, the matrix action problem could be reduced in polynomial time to the hidden subgroup problem of the direct sum of the additive group of the matrices.And it was proved that commutative matrix action problem could also be reduced to hidden subgroup problem of the direct sum of the additive group of the matrices in polynomial time.The cryptosystems based on this class of matrix action problem cannot against quantum attacks.This conclusion has theoretical significance in the design of public-key cryptography against quantum attacks.…”
Get full text
Article -
25
-
26
A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks
Published 2024-06-01Subjects: Get full text
Article -
27
An efficient method to generate elliptic curves
Published 2001-01-01Subjects: “…public key cryptosystem…”
Get full text
Article -
28
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01Subjects: Get full text
Article -
29
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01Subjects: Get full text
Article -
30
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
Published 2022-12-01Subjects: Get full text
Article -
31
Improvements on results of representation of elements in cyclotomic subgroup
Published 2007-01-01Subjects: “…public-key cryptosystem…”
Get full text
Article -
32
Research on wormhole attacks in wireless mesh networks
Published 2011-01-01Subjects: Get full text
Article -
33
Chosen message attacks method against ECC implementations
Published 2014-05-01Subjects: “…Elliptic curve cryptosystem…”
Get full text
Article -
34
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01Subjects: “…multivariate public key cryptosystem…”
Get full text
Article -
35
Pseudo 4D projective coordinate-based multi-base scalar multiplication
Published 2018-05-01Subjects: “…elliptic curve cryptosystem…”
Get full text
Article -
36
NTRU-type fully homomorphic encryption scheme without key switching
Published 2017-01-01Subjects: Get full text
Article -
37
Cayley–Purser secured communication and jackknife correlative classification for COVID patient data analysis
Published 2025-02-01Subjects: Get full text
Article -
38
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Published 2007-01-01Subjects: Get full text
Article -
39
Identity-based efficient authentication and key agreement protocol for mobile Internet
Published 2017-08-01Subjects: “…identity-based cryptosystem…”
Get full text
Article -
40
Security on a cryptographic model based on chaos
Published 2008-01-01“…The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these cryptosystems.Attack and corre-sponding improvement were deployed based on the model.The research is validated with a cryptanalysis on a chaotic en-cryption scheme presented by LI S J in Physics Letters A.…”
Get full text
Article