Showing 1 - 20 results of 28 for search '"cryptosystems"', query time: 0.04s Refine Results
  1. 1

    Pairing Optimizations for Isogeny-Based Cryptosystems by Shiping Cai, Kaizhan Lin, Chang-An Zhao

    Published 2024-01-01
    “…To achieve this, we propose several techniques for a better implementation of pairings in isogeny-based cryptosystems. We use (modified) Jacobian coordinates and present new algorithms for Miller function computations to compute pairings of order 2∙ and 3∙. …”
    Get full text
    Article
  2. 2

    A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding by S. J. Sheela, K. V. Suresh, Deepaknath Tandur

    Published 2017-01-01
    “…This paper introduces a new audio cryptosystem based on chaotic maps, hybrid chaotic shift transform (HCST), and deoxyribonucleic acid (DNA) encoding rules. …”
    Get full text
    Article
  3. 3

    Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations by Aleksėjus Michalkovič, Jokūbas Žitkevičius

    Published 2023-11-01
    “… In this paper we consider a modification of the attack on the classic RSA cryptosystem aimed at factoring the public modulus n, which is a product of three primes. …”
    Get full text
    Article
  4. 4

    A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map by Ali Soleymani, Md Jan Nordin, Elankovan Sundararajan

    Published 2014-01-01
    “…The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.…”
    Get full text
    Article
  5. 5
  6. 6

    A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform by Srinivas Koppu, V. Madhu Viswanatham

    Published 2017-01-01
    “…An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography by J.‐F. Biasse, X. Bonnetain, E. Kirshanova, A. Schrottenloher, F. Song

    Published 2023-03-01
    “…Abstract In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post‐quantum secure cryptosystems. …”
    Get full text
    Article
  10. 10

    A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis by Hyun-Ju Jo, Ji Won Yoon

    Published 2015-06-01
    “…However, these technical advancements also allow malicious individuals to obtain high computational power to attack cryptosystems. Traditional cryptosystem countermeasures have been somewhat passive in response to this change, because they simply increase computational costs by increasing key lengths. …”
    Get full text
    Article
  11. 11

    Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives by Yevhen Kotukh, Hennadii Khalimov

    Published 2024-06-01
    “…Quantum-resistant cryptosystems based on lattices and other post-quantum candidates also exploit computationally complex tasks. …”
    Get full text
    Article
  12. 12

    SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain by Mahesh Kumar Morampudi, Munaga V. N. K. Prasad, Surya Narayana Raju Undi

    Published 2022-01-01
    “…Abstract Homomorphic encryption (HE) is the most widely explored research area in the construction of privacy‐preserving biometric authentication systems because of its advantages over cancellable biometrics and biometric cryptosystems. However, most of the existing privacy‐preserving biometric authentication systems using HE assume that the server performs computations honestly. …”
    Get full text
    Article
  13. 13

    A lightweight privacy preservation authentication protocol for IoMT using ECC based blind signature by Kalpana Samal, Shanta Kumari Sunanda, Debasish Jena, Srikanta Patnaik

    Published 2025-01-01
    “…Compared with existing protocols that use public cryptosystems, such ElGamal and RSA, the suggested protocol stands out due to its smaller key size and reduced computational overhead. …”
    Get full text
    Article
  14. 14

    Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes by Ammar S. Alanazi, Noor Munir, Majid Khan, Muhammad Asif, Iqtadar Hussain

    Published 2021-01-01
    “…The proposed attacks are successfully performed to retrieve the key with very little execution time by using just one chosen image which indicates the vulnerability of multiple chaotic S-boxes-based cryptosystems. The retrieved data is passed through some statistical analysis such as correlation, histogram, and entropy to check the correctness of recovered data.…”
    Get full text
    Article
  15. 15

    Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited by Huiwen Jia, Yupu Hu, Chunming Tang

    Published 2022-01-01
    “…Abstract For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages approximately from a discrete Gaussian distribution. …”
    Get full text
    Article
  16. 16

    Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications by Abdul Razaq, Muhammad Mahboob Ahsan, Hanan Alolaiyan, Musheer Ahmad, Qin Xin

    Published 2024-12-01
    “…In essence, the security of these cryptosystems is contingent upon the quality of the S-box that is implemented. …”
    Get full text
    Article
  17. 17

    Private feasible solution determination by Xue Ge, Jiawei Dou, Wenli Wang, Yingnan Wang

    Published 2021-01-01
    “…In this study, the authors propose a protocol based on elliptic curve cryptosystem for this problem and prove that the protocol is secure in the semi‐honest model. …”
    Get full text
    Article
  18. 18

    Comparative analysis of integer factorization algorithms by G. Kimsanova, R. Ismailova, R. Sultanov

    Published 2015-10-01
    “…Integer factorization problem, which is used as the basis in many public key cryptosystem, is generally thought to be hard problem even on a modern computers. …”
    Get full text
    Article
  19. 19

    An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature by Yuanpan Zheng, Guangyu Chen, Liguan Guo

    Published 2020-01-01
    “…Based on the certificateless cryptosystem and group signature ideas, this paper proposes a certificateless group signature anonymous authentication scheme for the VANETs of a smart city. …”
    Get full text
    Article
  20. 20

    An Improved Genetic Algorithm for Developing Deterministic OTP Key Generator by Ashish Jain, Narendra S. Chaudhari

    Published 2017-01-01
    “…Recently, a genetic-based random key generator (GRKG) for the one-time pad (OTP) cryptosystem has been proposed in the literature which has certain limitations. …”
    Get full text
    Article