Zobrazeno 1 - 10
of 4 318
pro vyhledávání: '"Discrete logarithm"'
Autor:
Yanlong Ma
Publikováno v:
Computer Science Journal of Moldova, Vol 32, Iss 2(95), Pp 289-307 (2024)
In this paper, we will solve an important form of hidden discrete logarithm problem (HDLP) and a generalized form of HDLP (GHDLP) over non-commutative associative algebras (FNAAs). We will reduce them to discrete logarithm problem (DLP) in a finite f
Externí odkaz:
https://doaj.org/article/5b83070bc9d946cc8879593224f8155a
Autor:
Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Mou Dasgupta, Ashok Kumar Das, Youngho Park
Publikováno v:
IEEE Open Journal of the Computer Society, Vol 5, Pp 329-342 (2024)
Radio Frequency Identification (RFID) promotes the fundamental tracking procedure of the Internet of Things (IoT) network due to its autonomous data collection as well as transfer incurring low costs. To overcome the insecure exchange of tracking dat
Externí odkaz:
https://doaj.org/article/67b663a2802640138047a5b43bf661d1
Autor:
Eman Abouelkheir, Shamia El-Sherbiny
Publikováno v:
IEEE Access, Vol 12, Pp 55918-55924 (2024)
Preserving the privacy of sensitive data such as mercantile, medical, political or financial might utilize encryption, these encrypted data, in some cases, may be needed to be decrypted by other party, for this issue, the dual receiver encryption, DR
Externí odkaz:
https://doaj.org/article/9aadfd3713564b41b07b620b031886e7
Autor:
Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Mou Dasgupta, Ashok Kumar Das, Youngho Park
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 5, Pp 583-598 (2024)
Traditional voting systems mainly comprise of paper polling, electronic ballot system (EVM), mechanical devices, etc., and demand the physical presence of the voters. In the new age of digitization, the electronic voting system has come up with a uni
Externí odkaz:
https://doaj.org/article/893c828bf2ac430eac591149a9252d54
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-27 (2023)
Abstract The elliptic curve discrete logarithm problem (ECDLP) is a popular choice for cryptosystems due to its high level of security. However, with the advent of the extended Shor’s algorithm, there is concern that ECDLP may soon be vulnerable. W
Externí odkaz:
https://doaj.org/article/95e13729b237487fa7399b1280c091e2
Publikováno v:
Journal of Telecommunications and Information Technology, Vol 1, Iss 1 (2024)
This paper investigates how to reduce the elliptic curve discrete logarithm problem over prime fields to the quadratic unconstrained binary optimization (QUBO) problem in order to obtain as few logical qubits as possible. In the best case scenario, i
Externí odkaz:
https://doaj.org/article/e8152b5847b943b7939593c576759432
Autor:
Xiazhou Yang
Publikováno v:
Heliyon, Vol 10, Iss 3, Pp e24766- (2024)
We develop a novel method to completely solve the 3-term partial exponential Diophantine equation that represents a generalization of the standard discrete logarithm problem. Our method not only reveals the internal structure of the equation's soluti
Externí odkaz:
https://doaj.org/article/a65599982e1847bd9c7b004885ee99a8
Publikováno v:
Mathematical Biosciences and Engineering, Vol 20, Iss 10, Pp 18146-18172 (2023)
In conventional message communication systems, the practice of multi-message multi-receiver signcryption communication encounters several challenges, including the vulnerability to Key Generation Center (KGC) attacks, privacy breaches and excessive c
Externí odkaz:
https://doaj.org/article/01b11db950a849dd90dda34b03132116
Publikováno v:
Information, Vol 15, Iss 5, p 282 (2024)
Security and efficiency remain a serious concern for Internet of Things (IoT) environments due to the resource-constrained nature and wireless communication. Traditional schemes are based on the main mathematical operations, including pairing, pairin
Externí odkaz:
https://doaj.org/article/9da3288183a24ff085285ee8e9a3e497