نتایج جستجو برای: biometric cryptosystem

تعداد نتایج: 14652  

2017
A. T. Wiersma

The content distributors take content protection and Digital Rights Management of content very serious. As such many provisions already exist to make sure content is securely sent to, and only to, licensed clients. In this paper an alternative content encryption system is proposed by using the homomorphic features of asymmetric cryptography systems. Using a split-key derivative of the RSA crypt...

2011
Mina Mishra V. H. Mankar

This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing and cryptanalysis of chaotic cryptosystem for the validity of cryptosystems and improvement in encryption techniques. This review analyzes the role tha...

2003
Seong-Hun Paeng Bae Eun Jung Kil-Chan Ha

In Crypto 97, a public key cryptosystem based on the closest vector problem was suggested by Goldreich, Goldwasser and Halevi [4]. In this paper, we propose a public key cryptosystem applying representations of polynomials to the GGH encryption scheme. Its key size is much smaller than the GGH system so that it is a quite practical and efficient lattice based cryptosystem.

2002
Kouichi Sakurai Tsuyoshi Takagi

Choi et al. proposed the modified Paillier cryptosystem (M-Paillier cryptosystem). They use a special public-key g ∈ ZZ/nZZ such that gφ(n) = 1 + n mod n2, where n is the RSA modulus. The distribution of the public key g is different from that of the original one. In this paper, we study the security of the usage of the public key. Firstly, we prove that the one-wayness of the M-Paillier crypto...

Journal: :IACR Cryptology ePrint Archive 2001
T. Moh Jiun-Ming Chen

In the paper [1] published in “Asiacrypt 2000”, L. Goubin and N.T. Courtois propose an attack on the TTM cryptosystem. In paper [1], they mispresent TTM cryptosystem. Then they jump an attack from an example of TTM to the general TTM cryptosystem. Finally they conclude:”There is very little hope that a secure triangular system (Tame transformation system in our terminology) will ever be propose...

2006
Shuichi Aono Masahiro Wada Yoshifumi Nishio

A chaotic map has various features. A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by the iterations of a chaotic map. These features looks similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. The chaotic cryptosystem is researched as an application of cha...

Journal: :CoRR 2012
Roohallah Rastaghi Hamid R. Dalili Oskouei

In this paper, we proposed a new attack against Hwang et al.’s cryptosystem. This cryptosystem uses a super-increasing sequence as private key and the authors investigate a new algorithm called permutation combination algorithm to enhance density of knapsack to avoid the low-density attack. Sattar J. Aboud [Aboud j. Sattar, “An improved knapsack public key cryptography system”, International Jo...

Journal: :Applicable Algebra in Engineering, Communication and Computing 2014

Journal: :International Journal of Scientific and Research Publications (IJSRP) 2020

Journal: :Electronics Letters 1985

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید