نتایج جستجو برای: public key cryptosystem

تعداد نتایج: 897768  

2001
Seong-Hun Paeng Kil-Chan Ha Jae Heon Kim Seongtaek Chee Choonsik Park

Most public key cryptosystems have been constructed based on abelian groups up to now. We propose a new public key cryptosystem built on finite non abelian groups in this paper. It is convertible to a scheme in which the encryption and decryption are much faster than other well-known public key cryptosystems, even without no message expansion. Furthermore a signature scheme can be easily derive...

1991
Thomas Beth F. Schaefer

For public key cryptosystems multiplication on elliptic curves can be used instead of exponentiation in finite fields. One attack to such a system is: embedding the elliptic curve group into the multiplicative group of a finite field via weilpairing; calculating the discrete logarithm on the curve by solving the discrete logarithm in the finite field. This attack can be avoided by constructing ...

2005
Michael Coglianese Bok-Min Goi

In this paper, we propose a new variant of the NTRU public key cryptosystem − the MaTRU cryptosystem. MaTRU works under the same general principles as the NTRU cryptosystem, except that it operates in a different ring with a different linear transformation for encryption and decryption. In particular, it operates in the ring of k by k matrices of polynomials in R = Z[X]/(X−1), whereas NTRU oper...

Journal: :I. J. Network Security 2015
Chenglian Liu Chin-Chen Chang Zhi-Pan Wu Shi-Lin Ye

The Goldbach’s conjecture has plagued mathematicians for over two hundred and seventy years. Whether professionals or amateur enthusiasts, all have been fascinated by this question. Why do mathematicians have no way to solve this problem? Till now, Chen has been recognized for the most concise proof his “1 + 2” theorem in 1973. In this article the authors will use elementary concepts to describ...

2010
Fabien Herbaut Pascal Véron

Addition chains are classical tools used to speed up exponentiation in cryptographic algorithms. In this paper we proposed to use a subset of addition chains, the Euclidean addition chains, in order to define a new public key cryptosystem.

2004
LIH-CHUNG WANG FEI-HWANG CHANG

Abstract. We introduce a new public-key cryptosystem with tractable rational maps. As an application of abstract algebra and algebraic geometry to cryptography, TRMC (Tractable Rational Map Cryptosystem) has many superior properties including high complexity, easy implementation and very fast execution. We describe the principles and implementation of TRMC and analyze its properties. Also, we g...

Journal: :IEICE Transactions 2005
Masao Kasahara Ryuichi Sakai

Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over F2. However most of the proposed public key cryptosystems based on multivariate polynomials, are proved not secure. In this paper, we propose several types of new constructions of public key cryptosystems based on randomly generated singular simultaneous equations. One of the features of the ...

Journal: :IEICE Transactions 2009
Shigeo Tsujii Kohtaro Tadaki Ryou Fujita Masahito Gotaishi Toshinobu Kaneko

Following the last proposal of the nonlinear Piece in Hand method, which has 3-layer structure, 2-layer nonlinear Piece in Hand method is proposed. Both of them aim at enhancing the security of existing and future multivariate public key cryptosystems. The new nonlinear Piece in Hand is compared with the 3-layer method and PMI+, which was proposed by Ding, et al.

2016
Joan-Josep Climent Juan Antonio López-Ramos

In this paper we use the nonrepresentable ring E (m) p to introduce public key cryptosystems in noncommutative settings and based on the Semigroup Action Problem and the Decomposition Problem respectively.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید