-
1
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…To achieve this, we propose several techniques for a better implementation of pairings in isogeny-based cryptosystems. We use (modified) Jacobian coordinates and present new algorithms for Miller function computations to compute pairings of order 2∙ and 3∙. …”
Get full text
Article -
2
A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding
Published 2017-01-01“…This paper introduces a new audio cryptosystem based on chaotic maps, hybrid chaotic shift transform (HCST), and deoxyribonucleic acid (DNA) encoding rules. …”
Get full text
Article -
3
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
Published 2023-11-01“… In this paper we consider a modification of the attack on the classic RSA cryptosystem aimed at factoring the public modulus n, which is a product of three primes. …”
Get full text
Article -
4
A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map
Published 2014-01-01“…The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.…”
Get full text
Article -
5
A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes
Published 2025-01-01Get full text
Article -
6
A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform
Published 2017-01-01“…An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. …”
Get full text
Article -
7
A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks
Published 2024-06-01Subjects: Get full text
Article -
8
Cayley–Purser secured communication and jackknife correlative classification for COVID patient data analysis
Published 2025-02-01Subjects: Get full text
Article -
9
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01“…Abstract In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post‐quantum secure cryptosystems. …”
Get full text
Article -
10
A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis
Published 2015-06-01“…However, these technical advancements also allow malicious individuals to obtain high computational power to attack cryptosystems. Traditional cryptosystem countermeasures have been somewhat passive in response to this change, because they simply increase computational costs by increasing key lengths. …”
Get full text
Article -
11
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01“…Quantum-resistant cryptosystems based on lattices and other post-quantum candidates also exploit computationally complex tasks. …”
Get full text
Article -
12
SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain
Published 2022-01-01“…Abstract Homomorphic encryption (HE) is the most widely explored research area in the construction of privacy‐preserving biometric authentication systems because of its advantages over cancellable biometrics and biometric cryptosystems. However, most of the existing privacy‐preserving biometric authentication systems using HE assume that the server performs computations honestly. …”
Get full text
Article -
13
A lightweight privacy preservation authentication protocol for IoMT using ECC based blind signature
Published 2025-01-01“…Compared with existing protocols that use public cryptosystems, such ElGamal and RSA, the suggested protocol stands out due to its smaller key size and reduced computational overhead. …”
Get full text
Article -
14
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
Published 2021-01-01“…The proposed attacks are successfully performed to retrieve the key with very little execution time by using just one chosen image which indicates the vulnerability of multiple chaotic S-boxes-based cryptosystems. The retrieved data is passed through some statistical analysis such as correlation, histogram, and entropy to check the correctness of recovered data.…”
Get full text
Article -
15
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…Abstract For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages approximately from a discrete Gaussian distribution. …”
Get full text
Article -
16
Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications
Published 2024-12-01“…In essence, the security of these cryptosystems is contingent upon the quality of the S-box that is implemented. …”
Get full text
Article -
17
Private feasible solution determination
Published 2021-01-01“…In this study, the authors propose a protocol based on elliptic curve cryptosystem for this problem and prove that the protocol is secure in the semi‐honest model. …”
Get full text
Article -
18
Comparative analysis of integer factorization algorithms
Published 2015-10-01“…Integer factorization problem, which is used as the basis in many public key cryptosystem, is generally thought to be hard problem even on a modern computers. …”
Get full text
Article -
19
An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature
Published 2020-01-01“…Based on the certificateless cryptosystem and group signature ideas, this paper proposes a certificateless group signature anonymous authentication scheme for the VANETs of a smart city. …”
Get full text
Article -
20
An Improved Genetic Algorithm for Developing Deterministic OTP Key Generator
Published 2017-01-01“…Recently, a genetic-based random key generator (GRKG) for the one-time pad (OTP) cryptosystem has been proposed in the literature which has certain limitations. …”
Get full text
Article