-
1
Security of the cryptosystems based on ergodic matrices
Published 2015-08-01“…The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly,then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.…”
Get full text
Article -
2
Identity based and key insulated cryptosystem
Published 2009-01-01Subjects: “…identity-based cryptosystem…”
Get full text
Article -
3
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…To achieve this, we propose several techniques for a better implementation of pairings in isogeny-based cryptosystems. We use (modified) Jacobian coordinates and present new algorithms for Miller function computations to compute pairings of order 2∙ and 3∙. …”
Get full text
Article -
4
Triple receiver public key encryption cryptosystem
Published 2020-12-01“…A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple receiver public key encryption schemes with different security were constructed.If the gap bilinear Diffie-Hellman (GBDH) problem and the computational Diffie-Hellman (CDH) problem were proved formally to be intractable,then the two schemes proposed were semantically secure against chosen-plaintext attacks and against adaptive chosen ciphertext attacks respectively.The proposed scheme only added an exponential operation and a hash operation,and constructed three independent receivers which had a high efficiency.Analyses show that proposed scheme can improve the security of TLS protocol and apply to hierarchical public key cryptosystems.…”
Get full text
Article -
5
Novel extended multivariate public key cryptosystem
Published 2014-04-01Subjects: “…the novel extended cryptosystem…”
Get full text
Article -
6
Perfect secrecy cryptosystem with nonuniform distribution of keys
Published 2018-11-01Subjects: “…single key cryptosystem…”
Get full text
Article -
7
Cryptanalysis of novel extended multivariate public key cryptosystem
Published 2015-06-01Subjects: “…multivariate public key cryptosystems…”
Get full text
Article -
8
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01Subjects: Get full text
Article -
9
Correlation calculation decrypting for BSS-based image cryptosystem
Published 2008-01-01Get full text
Article -
10
Public key cryptosystem based on algebraic geometric codes
Published 2008-01-01“…A public-key cryptosystem based on algebraic geometric codes was proposed.The cryptosystem is a pub-lic-key system combined with error correcting.Compared with M public-key system and some variants,the performance of the public-key cryptosystem was analyzed.It is shown that the security,information rate,error correcting,and prob-ability of correct decipher were improved.…”
Get full text
Article -
11
Impossible statistical fault analysis of the PRIDE lightweight cryptosystem
Published 2024-01-01Subjects: Get full text
Article -
12
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01Subjects: Get full text
Article -
13
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01Subjects: “…RSA cryptosystem…”
Get full text
Article -
14
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01“…In particular, a SPA attack against RSA cryptosystem was showed based on large integer modular exponentiation. …”
Get full text
Article -
15
A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding
Published 2017-01-01“…This paper introduces a new audio cryptosystem based on chaotic maps, hybrid chaotic shift transform (HCST), and deoxyribonucleic acid (DNA) encoding rules. …”
Get full text
Article -
16
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
Published 2023-11-01“… In this paper we consider a modification of the attack on the classic RSA cryptosystem aimed at factoring the public modulus n, which is a product of three primes. …”
Get full text
Article -
17
A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map
Published 2014-01-01“…The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.…”
Get full text
Article -
18
Improvement on the XTP public key cryptosystem and communication protocol of provable security
Published 2007-01-01Subjects: “…public key cryptosystem…”
Get full text
Article -
19
Further research on public-key cryptosystems based on third-order recurrence sequence
Published 2005-01-01Subjects: “…public-key cryptosystem…”
Get full text
Article -
20
A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes
Published 2025-01-01Get full text
Article