搜索结果: 1-15 共查到“军事学 Public key cryptosystems”相关记录34条 . 查询时间(0.06 秒)
Indifferentiability for Public Key Cryptosystems
Indifferentiability Composition Public key encryption Random oracle model
2019/4/11
We initiate the study of indifferentiability for public key encryption and other public key primitives. Our main results are definitions and constructions of public key cryptosystems that are indiffer...
Passwords bootstrap symmetric and asymmetric cryptography, tying keys to an individual user. Biometrics are intended to strengthen this tie. Unfortunately, biometrics exhibit noise between repeated re...
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems
Hardware Implementation Modular Multiplication Montgomery Algorithm
2016/5/23
The arithmetic in a finite field constitutes the core of Public Key Cryptography like RSA, ECC or pairing-based cryptography. This paper discusses an efficient hardware implementation of the Coarsely ...
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems
public-key cryptography Algebraic Geometry codes
2016/1/26
We give a polynomial time attack on the McEliece public key cryptosystem based on algebraic geometry codes. Roughly speaking, this attacks runs in O(n4) operations in Fq, where n denotes the code leng...
Double shielded Public Key Cryptosystems
public key protocol braid group subgroup membership problem
2016/1/8
By introducing extra shields on Shpilrain and Ushakov’s Ko-Lee-like protocol based on the
decomposition problem of group elements we propose two new key exchange schemes and then a number of
public ...
New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC
Public Key Cryptosystem Error-Correcting Code Reed-Solomon code
2016/1/8
In this paper, we present new classes of public key cryptosystem over F2
8 based on Reed-Solomon codes,
referred to as K(XVII)SE(1)PKC and K(XVII)ΣΠPKC, a subclass of K(XVII)SE(1)PKC. We show that K...
Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC.
Public Key Cryptosystem Error-Correcting Code
2014/3/7
In this paper, we present a new class of public key cryptosystems by modifying K(XII)SE(1)PKC[1], referred to as K(XIII)SE(1)PKC, and a particular class of K(XIII)SE(1)PKC, Kp(XIII)SE(1)PKC. We show t...
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems --
Public Key Cryptosystem Error-Correcting Code
2014/3/12
In this paper, we present a new class of public key cryptosystem based on Reed-Solomon codes, a member of the code based PKC(CBPKC), referred to as K(XII)SE(1)PKC. We show that K(XII)SE(1)PKC can be s...
Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0
public-key cryptography / Public key cryptosystem Error-correcting code Code based PKC Multivariate PKC Gr鯾 ner bases PQC
2012/3/23
In this paper, we present a new class of public-key cryptosystems, K(IX)SE(1)PKC realizing the coding rate of exactly 1.0, based on random pseudo cyclic codes. We show that K(IX)SE(1)PKC is secure aga...
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
post-quantum cryptography McEliece Niederreiter side-channel attacks
2010/9/14
Research within “post-quantum” cryptography has focused on development of schemes that resist quantum cryptanalysis. However, if such schemes are to be deployed, practical questions of efficiency...
A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
public-key cryptography Public Key Cryptosystem Error-Correcting Code Multivariate PKC Linear PKC McEliece PKC PQC
2010/7/14
In this paper, we present a new scheme referred to as K(III) scheme which would be effective for improving a certain class of PKC's. Using K(III) scheme, we propose a new method for constructing the p...
Hash-based Multivariate Public Key Cryptosystems
public-key cryptography Multivariate Public Key Cryptosystems
2010/7/13
Many efficient attacks have appeared in recent years, which have led to serious blow for the traditional multivariate public key cryptosystems. For example, the signature scheme SFLASH was broken by D...
A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0
Public Key Cryptosystem (PKC) Error-Correcting Code Multivariate PKC Linear PKC McEliece PKC
2010/3/16
In this paper, we propose a new method for constructing the public-key cryptosystems based on a class of perfect error-correcting codes. The constructed PKC is referred to as K(IV)SE(1)PKC. In K(IV)SE...
Cryptanalysis of two knapsack public-key cryptosystems
Knapsack public-key cryptosystem Cryptanalysis
2009/11/18
In this paper, we cryptanalyze two knapsack cryptosystems.
The first one is proposed by Hwang et al [4], which is based on a new
permutation algorithm named Permutation Combination Algorithm. We
sh...
Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
Public Key Cryptography Alternative algebra lattice based cryptography
2009/9/27
In this paper, we show that the fundamental concepts behind the Ntr¹u cryptosystem can
be extended to a broader algebra than Dedekind domains. Also, we present an abstract and
generalized algor...