نتایج جستجو برای: public key cryptosystem

تعداد نتایج: 897768  

2000
Sachar Paulus Tsuyoshi Takagi

We present a new cryptosystem based on ideal arithmetic in quadratic orders. The method of our trapdoor is diierent from the Diie-Hellman key distribution scheme or the RSA cryp-tosystem. The plaintext m is encrypted by mp r , where p is a xed element and r is a random integer, so our proposed cryptosystem is a probabilistic encryption scheme and has the ho-momorphy property. The most prominent...

2000
Javier Lopez Antonio Maña Juan J. Ortega José M. Troya

Public-key cryptography is fast becoming the foundation for those applications that require security and authentication in open networks. But the widespread use of a global public-key cryptosystem requires that public-key certificates are always available and up-to-date. Problems associated to digital certificates management, like storage, retrieval, maintenance, and, specially, revocation, req...

2018

A new approach for identifying a friend aircrafts from foe (IFF) using public-key cryptosystem is introduced. Two schemes of public-key cryptosystem namely: RSA and knapsack public-keys are considered, which provide higher security than conventional identification methods. The practical aspects of using such systems for aircraft identification purposes are discussed. Computer simulation example...

2006
Matthieu Finiasz Serge Vaudenay

Inspired by fast correlation attacks on stream ciphers, we present a stream cipher-like construction for a public-key cryptosystem whose security relies on two problems: finding a low-weight multiple of a given polynomial and a Hidden Correlation problem. We obtain a weakly secure public-key cryptosystem we call TCHo (as for Trapdoor Cipher, Hardware Oriented). Using the Fujisaki-Okamoto constr...

Journal: :International journal of Network Security & Its Applications 2010

Journal: :Journal of Applied Mathematics and Computing 2019

Journal: :Advances in Mathematics 2023

In this paper, we propose a new public key cryptosystem in non-commutative group over ring, using hard problem, Factorization with Discrete Logarithm Problem (FDLP). The security analysis of the proposed scheme is discussed and it shown that system secure.

Journal: :Europan journal of science and technology 2021

A cryptosystem is a structure or scheme consisting of set algorithms that converts plaintext to ciphertext encode decode messages securely. The points at computer system employs cryptography. Cryptosystems are classified by the method they use encrypt data. One them symmetric key encryption. While algorithm uses same for encryption and decryption, asymmetric public-key different keys. So it mor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید