搜索结果: 16-30 共查到“军事学 Public key cryptosystems”相关记录34条 . 查询时间(0.203 秒)
Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
Public Key Cryptography Alternative algebra lattice based cryptography
2009/9/22
In this paper, we show that the fundamental concepts behind the Ntr¹u cryptosystem can
be extended to a broader algebra than Dedekind domains. Also, we present an abstract and
generalized algor...
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems
Ciphertext Size Dolev-Dwork-Naor Public Key Cryptosystems
2009/6/15
We show a method for compressing the ciphertext and reducing the computational cost of the
Dolev-Dwork-Naor cryptosystem and related schemes without changing their other parameters nor reducing the o...
Proposal of PPS Multivariate Public Key Cryptosystems
post-quantum cryptography public key cryptosystem multivariate public
2009/6/15
In this paper we propose a new MPKC, called PPS, based on (i) the 2-layer
nonlinear piece in hand method, (ii) PMI, and (iii) STS. The PPS is a specific MPKC
obtained by applying the 2-layer nonline...
Most of the work in the analysis of cryptographic schemes is concentrated in abstract ad-
versarial models that do not capture side-channel attacks. Such attacks exploit various forms
of unintended ...
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
Lattice-based cryptography learning with errors quantum computation
2009/6/10
We construct public-key cryptosystems that are secure assuming the worst-case hardness of approximating
the length of a shortest nonzero vector in an n-dimensional lattice to within a small poly(n) f...
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
public key cryptosystem multivariate polynomial multivariate public key cryptosystem
2009/6/5
The piece in hand (PH) is a general scheme which is applicable to any
reasonable type of multivariate public key cryptosystems for the purpose of enhancing
their security. In this paper, we propose ...
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
public key cryptosystem multivariate polynomial multivariate public key cryptosystem
2009/6/3
It is widely believed to take exponential time to find a solution of a system
of random multivariate polynomials because of the NP-completeness of such a task.
On the other hand, in most of multivar...
On multivariate signature-only public key cryptosystems
Asymmetric cryptography finite fields Hidden Field Equations
2009/4/16
In a paper published at Asiacrypt 2000 a signature scheme
that (apparently) cannot be abused for encryption is published. The
problem is highly non-trivial and every solution should be looked upon
...
Key-Insulated Public-Key Cryptosystems.
Recently Landau and Diffie gave in a series of articles in the Notices of
the American Mathematical Society [DL02, Lan01, Lan00a, Lan00b] and in
the American Mathematical Monthly [Lan04] excellent e...
On security of XTR public key cryptosystems against Side Channel Attacks
XTR Public Key Cryptosystem Side Channel Attacks SPA
2009/3/27
The XTR public key system was introduced at Crypto 2000.
Application of XTR in cryptographic protocols leads to substantial sav-
ings both in communication and computational overhead without com-
p...
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
word problem finitely presented group public key cryptography
2009/3/20
At INDOCRYPT 2003 Abisha, Thomas, and Subramanian proposed two public
key schemes based on word problems in free partially commutative monoids
and groups. We show that both proposals are vulnerable ...
On public-key cryptosystems based on combinatorial group theory
Public-key cryptosystem combinatorial group theory Richard Thompson groups
2009/1/20
We analyze and critique the public-key cryptosystem, based on
combinatorial group theory, that was proposed by Wagner and Magyarik
in 1984. This idea is actually not based on the word problem but on...
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
multivariate public key cryptosystem quadratic polynomial algebraic cryptanalysis
2008/12/22
In the CT-track of the 2006 RSA conference, a new multivariate
public key cryptosystem, which is called the Medium Field Equation
(MFE) multivariate public key cryptosystem, is proposed by Wang,
Ya...
Stateful Public-Key Cryptosystems:How to Encrypt with One 160-bit Exponentiation
Public-Key Cryptosystems Encrypt 160-bit Exponentiation
2008/12/10
We show how to significantly speed-up the encryption portion of some public-key cryptosystems
by the simple expedient of allowing a sender to maintain state that is re-used across
different encrypti...