نتایج جستجو برای: private key cryptosystem

تعداد نتایج: 645641  

Journal: :CoRR 2008
Manas K. Patra Yan Zhang

Several of the basic cryptographic constructs have associated algebraic structures. Formal models proposed by Dolev and Yao to study the (unconditional) security of public key protocols form a group. The security of some types of protocols can be neatly formulated in this algebraic setting. We investigate classes of two-party protocols. We then consider extension of the formal algebraic framewo...

1998
Phong Q. Nguyen Jacques Stern

Recently, Ajtai discovered a fascinating connection between the worst-case complexity and the average-case complexity of some wellknown lattice problems. Later, Ajtai and Dwork proposed a cryptosystem inspired by Ajtai’s work, provably secure if a particular lattice problem is difficult in the worst-case. We present a heuristic attack (to recover the private key) against this celebrated cryptos...

1998
Phong Nguyen

Recently, Ajtai discovered a fascinating connection between the worst-case complexity and the average-case complexity of some well-known lattice problems. Later, Ajtai and Dwork proposed a cryptosystem inspired by Ajtai's work, provably secure if a particular lattice problem is diicult in the worst-case. We present a heuristic attack (to recover the private key) against this celebrated cryptosy...

Journal: :IACR Cryptology ePrint Archive 2009
Rajesh P. Singh Anupam Saikia B. K. Sarma

In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant a variant of Matsumoto Imai cryptosystem C*. However Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In this paper we propose a cryptosystem Little Dragon Two which is as efficient as Little Dragon cryptosystem but secure against all the known attacks. Like Little Dragon...

2006
A. M. Youssef

Baocang and Yupu proposed a relatively fast public key cryptosystem. The authors claim that the security of their system is based on two number-theoretic hard problems, namely the simultaneous Diophantine approximation problem and the integer factorisation problem. In this article we present a polynomial time heuristic attack that enables us to recover the private key from the public key. In pa...

Journal: :Journal of Mathematics and Statistics 2009

Journal: :IOSR Journal of Electrical and Electronics Engineering 2013

Journal: :Journal of Computational and Applied Mathematics 2014

Journal: :Lecture Notes in Computer Science 2021

A Sidon space is a subspace of an extension field over base in which the product any two elements can be factored uniquely, up to constants. This paper proposes new public-key cryptosystem multivariate type based on spaces, and has potential remain secure even if quantum supremacy attained. system, whose security relies hardness well-known MinRank problem, shown resilient several straightforwar...

Journal: :Journal of Engineering and Applied Sciences 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید