Zobrazeno 1 - 10
of 38
pro vyhledávání: '"asymmetric cryptosystems"'
Autor:
Vinny Cris Mandapati, Shashi Prabhakar, Harsh Vardhan, Ravi Kumar, Salla Gangi Reddy, Sakshi, Ravindra P. Singh
Publikováno v:
Engineering Proceedings, Vol 34, Iss 1, p 8 (2023)
In this paper, we propose a new asymmetric cryptosystem for phase image encryption, using the physically unclonable functions (PUFs) as security keys. For encryption, the original amplitude image is first converted into a phase image and modulated wi
Externí odkaz:
https://doaj.org/article/f33abd2a5b1141afaf6b913f98e72ce6
Publikováno v:
IEEE Access, Vol 8, Pp 187419-187430 (2020)
The asymmetric optical cryptosystems have been widely concerned due to their prominent characteristics of high security and robustness against attacks. In this paper, a resolution adaptative network is proposed to attack the asymmetric optical crypto
Externí odkaz:
https://doaj.org/article/879109b09c0c4833b0f7555d56ce3b79
Publikováno v:
Вестник Донского государственного технического университета, Vol 11, Iss 9, Pp 1544-1554 (2018)
The application of the bioinspired methods for handling the cryptanalysis problem of the asymmetric encryption algorithms on the basis of the composite number factorization is considered. The algorithms of ant and bee colonies for the composite numbe
Externí odkaz:
https://doaj.org/article/9125c803d67f40e7bac7619d6ffdd549
Publikováno v:
Symmetry, Vol 13, Iss 1, p 45 (2020)
The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and dis
Externí odkaz:
https://doaj.org/article/2d8de01b1d54436bacdbda9560f43ebb
Publikováno v:
Algorithms, Vol 12, Iss 10, p 209 (2019)
Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric cryptosystems. In particular, both correcting an error-affected codeword, and deriving the error vector
Externí odkaz:
https://doaj.org/article/b3c21eb704324beca3f80ce1615f8ac9
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 8, Pp 187419-187430 (2020)
The asymmetric optical cryptosystems have been widely concerned due to their prominent characteristics of high security and robustness against attacks. In this paper, a resolution adaptative network is proposed to attack the asymmetric optical crypto
Publikováno v:
Symmetry, Vol 13, Iss 45, p 45 (2021)
The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and dis
Publikováno v:
Advanced Engineering Research, Vol 11, Iss 9, Pp 1544-1554 (2011)
The application of the bioinspired methods for handling the cryptanalysis problem of the asymmetric encryption algorithms on the basis of the composite number factorization is considered. The algorithms of ant and bee colonies for the composite numbe
Externí odkaz:
https://doaj.org/article/5cfc1109c63648ab8cbf93b822134294
Publikováno v:
Symmetry
Volume 13
Issue 1
Volume 13
Issue 1
The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and dis