نتایج جستجو برای: rao nam secret key cryptosystem

تعداد نتایج: 576896  

Journal: :Computers & Mathematics with Applications 1988

2016
Pratima Popat Gutal

Distributed key generation cryptosystems has a major content called distributed key generation (DKG) protocol. This protocol allows number of participants of group to generate a set of keys such as private key and public key without determining some trusted participants. Only authorized subgroups of participants are capable to regenerate or implement the private key and the public key is an out...

2017
Shenghui Su Jianhua Zheng Shuwang Lu

This paper gives the definitions of an extra superincreasing sequence and an anomalous subset sum, and proposes a fast quantum-safe asymmetric cryptosystem called JUOAN2. The new cryptosystem is based on an additive multivariate permutation problem (AMPP) and an anomalous subset sum problem (ASSP) which parallel a multivariate polynomial problem and a shortest vector problem respectively, and c...

Journal: :Applied sciences 2023

Images with sensitive content require encryption for storage and transmission. Symmetric schemes can cipher them, while an asymmetric cryptosystem distribute the secret key safely. For this reason, we propose a dynamic hybrid cryptosystem, which ciphers images transfers its private keys. It has symmetric algorithm that applies Lorenz equations generating different boxes permutations in every pr...

Journal: :Int. Arab J. Inf. Technol. 2013
Li-Chin Huang Cheng-Chi Lee Min-Shiang Hwang

In this paper, a novel scheme to generate (n 2 + n) common secret keys in one session is proposed, in which two parties can use them to encrypt and decrypt their communicated messages by using symmetric-key cryptosystem. The proposed scheme is based on the difficulty of calculating discrete logarithms problem. All the session keys can be used against the known key attacks, main-in-the middle at...

Journal: :IACR Cryptology ePrint Archive 2014
Cong Chen Thomas Eisenbarth Ingo von Maurich Rainer Steinwandt

This work presents the first differential power analysis of an implementation of the McEliece cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the efficient QC-MDPC McEliece decryption operation as presented at DATE 2014. The presented cryptanalysis succeeds to recover the complete secret key after a few observed decryptions. It consists of a combina...

Journal: :Applied Mathematics & Information Sciences 2014

Journal: :IEEE Access 2021

This paper analyses a novel countermeasure to Leakage Power Analysis Attacks based on the application of random Body Bias voltage level at beginning encryption process. The effectiveness is established through development theoretical model Pearson correlation coefficient in presence varying body bias under both noiseless assumptions and algorithmic noise, simulations partial cryptosystem implem...

Journal: :Lecture Notes in Computer Science 2023

Among the fourth round finalists of NIST post-quantum cryptography standardization process for public-key encryption algorithms and key encapsulation mechanisms, three rely on hard problems from coding theory. Key mechanisms are frequently used in hybrid cryptographic systems: a algorithm exchange secret communication. A major point is thus initial that performed thanks to mechanism. In this pa...

2011
Sonal Sharma Saroj Hiranwal Prashant Sharma

RSA is an algorithm for public-key cryptography that is based on the presumed difficulty of factoring large integers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard, who first publicly described it in 1978. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید