Showing 1 - 20 results of 96 for search '"cryptosystems"', query time: 0.04s Refine Results
  1. 1

    Security of the cryptosystems based on ergodic matrices by Hua-wei HUANG, Chang-wen PENG, Yun-yun QU, Chun-hua LI

    Published 2015-08-01
    “…The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly,then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.…”
    Get full text
    Article
  2. 2

    Identity based and key insulated cryptosystem by ZHOU Yuan1, QIN Bao-shan 2, CAO Zhen-fu 3

    Published 2009-01-01
    Subjects: “…identity-based cryptosystem…”
    Get full text
    Article
  3. 3

    Pairing Optimizations for Isogeny-Based Cryptosystems by Shiping Cai, Kaizhan Lin, Chang-An Zhao

    Published 2024-01-01
    “…To achieve this, we propose several techniques for a better implementation of pairings in isogeny-based cryptosystems. We use (modified) Jacobian coordinates and present new algorithms for Miller function computations to compute pairings of order 2∙ and 3∙. …”
    Get full text
    Article
  4. 4

    Triple receiver public key encryption cryptosystem by Liutao ZHAO, Lin ZHONG, Jidong LIU, Caiqun WANG, Dan WU

    Published 2020-12-01
    “…A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple receiver public key encryption schemes with different security were constructed.If the gap bilinear Diffie-Hellman (GBDH) problem and the computational Diffie-Hellman (CDH) problem were proved formally to be intractable,then the two schemes proposed were semantically secure against chosen-plaintext attacks and against adaptive chosen ciphertext attacks respectively.The proposed scheme only added an exponential operation and a hash operation,and constructed three independent receivers which had a high efficiency.Analyses show that proposed scheme can improve the security of TLS protocol and apply to hierarchical public key cryptosystems.…”
    Get full text
    Article
  5. 5

    Novel extended multivariate public key cryptosystem by Shuai-ting QIAO, Yi-fa LI, Wen-bao HAN

    Published 2014-04-01
    Subjects: “…the novel extended cryptosystem…”
    Get full text
    Article
  6. 6

    Perfect secrecy cryptosystem with nonuniform distribution of keys by Chuanjun TIAN

    Published 2018-11-01
    Subjects: “…single key cryptosystem…”
    Get full text
    Article
  7. 7

    Cryptanalysis of novel extended multivariate public key cryptosystem by Xu-yun NIE, Bo LIU, Gang LU, Ting ZHONG

    Published 2015-06-01
    Subjects: “…multivariate public key cryptosystems…”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Public key cryptosystem based on algebraic geometric codes by ZHANG Ying, YUE Dian-wu

    Published 2008-01-01
    “…A public-key cryptosystem based on algebraic geometric codes was proposed.The cryptosystem is a pub-lic-key system combined with error correcting.Compared with M public-key system and some variants,the performance of the public-key cryptosystem was analyzed.It is shown that the security,information rate,error correcting,and prob-ability of correct decipher were improved.…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Simple power analysis attack against cryptosystems based on Montgomery algorithm by Gang GAN, Min WANG, Zhi-bo DU, Zhen WU

    Published 2013-08-01
    “…In particular, a SPA attack against RSA cryptosystem was showed based on large integer modular exponentiation. …”
    Get full text
    Article
  15. 15

    A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding by S. J. Sheela, K. V. Suresh, Deepaknath Tandur

    Published 2017-01-01
    “…This paper introduces a new audio cryptosystem based on chaotic maps, hybrid chaotic shift transform (HCST), and deoxyribonucleic acid (DNA) encoding rules. …”
    Get full text
    Article
  16. 16

    Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations by Aleksėjus Michalkovič, Jokūbas Žitkevičius

    Published 2023-11-01
    “… In this paper we consider a modification of the attack on the classic RSA cryptosystem aimed at factoring the public modulus n, which is a product of three primes. …”
    Get full text
    Article
  17. 17

    A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map by Ali Soleymani, Md Jan Nordin, Elankovan Sundararajan

    Published 2014-01-01
    “…The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.…”
    Get full text
    Article
  18. 18
  19. 19
  20. 20