نتایج جستجو برای: rao nam cryptosystem

تعداد نتایج: 16923  

2003
Gonzalo Álvarez Luis Hernández Encinas Ascensión Hernández Encinas Ángel Martín del Rey Gerardo Rodríguez Sánchez

In this paper we propose a new graphic symmetrical cryptosystem in order to encrypt a colored image defined by pixels and by any number of colors. This cryptosystem is based on a reversible bidimensional cellular automaton and uses a pseudorandom bit generator. As the key of the cryptosystem is the seed of the pseudorandom bit generator, the latter has to be cryptographically secure. Moreover, ...

Journal: :IACR Cryptology ePrint Archive 2008
Yanbin Pan Yingpu Deng

In 1998, Cai and Cusick proposed a lattice-based public-key cryptosystem based on the similar ideas of the Ajtai-Dwork cryptosystem, but with much less data expansion. However, they didn’t give any security proof. In our paper, we present an efficient ciphertext-only attack which runs in polynomial time against the cryptosystem to recover the message, so the Cai-Cusick lattice-based public-key ...

2004
Chin-Chen Chang Sun-Min Tsu

The difficulty of breaking Rabin's cryptosystem is the same as that of factoring its public key. So far, this has been proven to be very difficult. However the disadvantage of Rabin's cryptosystem is that the deciphering function cannot produce a unique plaintext. Many modified Rabin's cryptosystems have been proposed. Recently, an excellent scheme modified from Rabin's cryptosystem has been pr...

2014
Ernst Gabidulin Nina Pilipchuk

To provide information security in network we use the public key GPT (Gabidulin–Paramonov–Tretiyakov) cryptosystem based on rank codes. This cryptosystem was the subject of several attacks. Some of them were structural attacks, others were decoding attacks. In our opinion the most dangerous are structural attacks because decoding attacks can be prevented by proper choice of parameters. To preve...

2011
Chandrashekhar Meshram

In 1984, Shamir [1] introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify him self before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the “identity” of his communicatio...

2017
A. T. Wiersma

The content distributors take content protection and Digital Rights Management of content very serious. As such many provisions already exist to make sure content is securely sent to, and only to, licensed clients. In this paper an alternative content encryption system is proposed by using the homomorphic features of asymmetric cryptography systems. Using a split-key derivative of the RSA crypt...

2011
Mina Mishra V. H. Mankar

This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing and cryptanalysis of chaotic cryptosystem for the validity of cryptosystems and improvement in encryption techniques. This review analyzes the role tha...

2003
Seong-Hun Paeng Bae Eun Jung Kil-Chan Ha

In Crypto 97, a public key cryptosystem based on the closest vector problem was suggested by Goldreich, Goldwasser and Halevi [4]. In this paper, we propose a public key cryptosystem applying representations of polynomials to the GGH encryption scheme. Its key size is much smaller than the GGH system so that it is a quite practical and efficient lattice based cryptosystem.

2002
Kouichi Sakurai Tsuyoshi Takagi

Choi et al. proposed the modified Paillier cryptosystem (M-Paillier cryptosystem). They use a special public-key g ∈ ZZ/nZZ such that gφ(n) = 1 + n mod n2, where n is the RSA modulus. The distribution of the public key g is different from that of the original one. In this paper, we study the security of the usage of the public key. Firstly, we prove that the one-wayness of the M-Paillier crypto...

Journal: :IACR Cryptology ePrint Archive 2001
T. Moh Jiun-Ming Chen

In the paper [1] published in “Asiacrypt 2000”, L. Goubin and N.T. Courtois propose an attack on the TTM cryptosystem. In paper [1], they mispresent TTM cryptosystem. Then they jump an attack from an example of TTM to the general TTM cryptosystem. Finally they conclude:”There is very little hope that a secure triangular system (Tame transformation system in our terminology) will ever be propose...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید