Journal articles on the topic 'Cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
WANG, XING-YUAN, and YISONG TAN. "A MULTIPLE-PLAINTEXTS-ORIENTED CHAOTIC CRYPTOSYSTEM." International Journal of Modern Physics B 27, no. 32 (2013): 1350202. http://dx.doi.org/10.1142/s0217979213502020.
Full textAlekseychuk, Anton, and Olha Shevchuk. "A necessary condition for CPA-security of randomized symmetric code cryptosystems." Physico-mathematical modelling and informational technologies, no. 33 (September 3, 2021): 78–82. http://dx.doi.org/10.15407/fmmit2021.33.078.
Full textMaxrizal, Maxrizal, and Baiq Desy Aniska Prayanti. "Public Key Cryptosystem Based on Polynomial Composition." Indonesian Journal of Mathematics Education 2, no. 2 (2019): 69. http://dx.doi.org/10.31002/ijome.v2i2.1813.
Full textKyaw, Myo Thu, Swar Hlaing Kyaw, and Aung Aung Nay. "Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems." International Journal of Trend in Scientific Research and Development 3, no. 6 (2019): 448–50. https://doi.org/10.5281/zenodo.3588011.
Full textFujita, Hachiro. "Quantum McEliece public-key cryptosystem." Quantum Information and Computation 12, no. 3&4 (2012): 181–203. http://dx.doi.org/10.26421/qic12.3-4-1.
Full textMaxrizal, Maxrizal. "Public Key Cryptosystem Based on Singular Matrix." Trends in Sciences 19, no. 3 (2022): 2147. http://dx.doi.org/10.48048/tis.2022.2147.
Full textHan, Dongfu. "The Innovations Made on the RSA Cryptosystem Using the Eulers Totient Function." Applied and Computational Engineering 8, no. 1 (2023): 493–98. http://dx.doi.org/10.54254/2755-2721/8/20230253.
Full textKareem Abed, Fatehiya Abdul, Zaynab Anwer Ahmed, and Abir Jaafer Hussain. "A novel cryptosystem using integer power." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 4-B (2025): 1317–29. https://doi.org/10.47974/jdmsc-2270.
Full textKotukh, Yevgen, Hennady Khalimov, and Maksym Korobchynskyi. "CONSTRUCTION OF AN IMPROVED ENCRYPTION SCHEME ON GENERALIZED SUZUKI 2-GROUPS IN THE MST3 CRYPTOSYSTEM." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 19–30. http://dx.doi.org/10.28925/2663-4023.2023.22.1930.
Full textUkwuoma, Henry Chima, Gabriel Arome, Aderonke Thompson, and Boniface Kayode Alese. "Post-quantum cryptography-driven security framework for cloud computing." Open Computer Science 12, no. 1 (2022): 142–53. http://dx.doi.org/10.1515/comp-2022-0235.
Full textHuang, Huawei, Chunhua Li, and Lunzhi Deng. "Public-Key Cryptography Based on Tropical Circular Matrices." Applied Sciences 12, no. 15 (2022): 7401. http://dx.doi.org/10.3390/app12157401.
Full textWANG, XINGYUAN, JIANFENG ZHAO, and ZHENFENG ZHANG. "A CHAOTIC CRYPTOSYSTEM BASED ON MULTI-ONE-DIMENSIONAL MAPS." Modern Physics Letters B 23, no. 02 (2009): 183–89. http://dx.doi.org/10.1142/s0217984909017947.
Full textZhou, Xuan Wu, and Yan Fu. "Blind Signature Based on Discrete Logarithm Type Cryptosystem." Advanced Materials Research 204-210 (February 2011): 1318–21. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1318.
Full textKondratyonok, Nikita V. "Analysis of the RSA-cryptosystem in abstract number rings." Journal of the Belarusian State University. Mathematics and Informatics, no. 1 (March 30, 2020): 13–21. http://dx.doi.org/10.33581/2520-6508-2020-1-13-21.
Full textNisviasari, R., Dafik, I. H. Agustin, E. Y. Kurniawati, I. N. Maylisa, and B. J. Septory. "Improving the robustness of the affine cipher by using a rainbow antimagic coloring." Journal of Physics: Conference Series 2157, no. 1 (2022): 012017. http://dx.doi.org/10.1088/1742-6596/2157/1/012017.
Full textHryshchuk, Ruslan, and Olga Hryshchuk. "A GENERALIZED MODEL OF FREDHOLM'S CRYPTOSYSTEM." Cybersecurity: Education Science Technique, no. 4 (2019): 14–23. http://dx.doi.org/10.28925/2663-4023.2019.4.1423.
Full textAbd-El-Atty, Bassem, Abdullah M. Iliyasu, and Ahmed A. Abd El-Latif. "A Multi-Image Cryptosystem Using Quantum Walks and Chebyshev Map." Complexity 2021 (October 18, 2021): 1–16. http://dx.doi.org/10.1155/2021/9424469.
Full textRashwan, Haitham, Ernst M. Gabidulin, Bahram Honary, and Haitham Cruickshank. "Enhancing the Security of the GPT Cryptosystem Against Attacks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 4 (2013): 2457–75. http://dx.doi.org/10.24297/ijct.v11i4.3130.
Full textFarajallah, Mousa, Safwan El Assad, and Olivier Deforges. "Fast and Secure Chaos-Based Cryptosystem for Images." International Journal of Bifurcation and Chaos 26, no. 02 (2016): 1650021. http://dx.doi.org/10.1142/s0218127416500218.
Full textBalasubramanian, Kannan, and M. Rajakani. "Implementation of Algorithms for Identity Based Encryption and Decryption." International Journal of Cyber Research and Education 1, no. 1 (2019): 52–62. http://dx.doi.org/10.4018/ijcre.2019010106.
Full textRatseev, S. M., O. I. Cherevatenko, and V. A. Chernyavskaya. "ON SOME CRYPTOSYSTEMS BASED ON ALGEBRAIC CODES." Vestnik of Samara University. Natural Science Series 27, no. 1 (2021): 62–73. http://dx.doi.org/10.18287/2541-7525-2021-27-1-62-73.
Full textKosolapov, Yuri V., and Evgeny A. Lelyuk. "On the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codes." Prikladnaya Diskretnaya Matematika, no. 57 (2022): 22–39. http://dx.doi.org/10.17223/20710410/57/2.
Full textMAJID, REZA NAGHIZADEH, ELANKOVAN SUNDARARAJAN, and ZULKARNAIN MD ALI. "AN EFFICIENT METHOD FOR IMPROVING THE COMPUTATIONAL PERFORMANCE OF THE CUBIC LUCAS CRYPTOSYSTEM." Bulletin of the Australian Mathematical Society 90, no. 1 (2014): 160–71. http://dx.doi.org/10.1017/s000497271400001x.
Full textCalkavur, Selda. "Some Public-key Cryptosystems Over Finite Fields." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (April 26, 2022): 99–104. http://dx.doi.org/10.37394/23209.2022.19.10.
Full textCalkavur, Selda. "Some Public-key Cryptosystems Over Finite Fields." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (April 26, 2022): 99–104. http://dx.doi.org/10.37394/23209.2022.19.10.
Full textRohilla, Alisha, Mehak Khurana, and Meena Kumari. "Homomorphic Cryptosystem." International Journal of Computer Network and Information Security 9, no. 5 (2017): 44–51. http://dx.doi.org/10.5815/ijcnis.2017.05.06.
Full textSaid, Mohamad Rushdan Md, and John Loxton. "A cubic analogue of the RSA cryptosystem." Bulletin of the Australian Mathematical Society 68, no. 1 (2003): 21–38. http://dx.doi.org/10.1017/s0004972700037382.
Full textKotukh, Yevgen, Oleksandr Marukhnenko, Hennadii Khalimov, and Maksym Korobchynskyi. "DEVELOPMENTOFMETHODSFORTESTINGTHELIBRARYOFCRYPTOGRAPHICTRANSFORMATIONSONTHEEXAMPLEOFTHEMST3CRYPTOSYSTEMBASEDONGENERALIZEDSUZUKI2-GROUPS." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 113–21. http://dx.doi.org/10.28925/2663-4023.2023.22.113121.
Full textMahmudah, Muhlisatul, and Tri Novita Irawati. "Cryptosystem Polyalphabetic Cipher Application." Jurnal Axioma : Jurnal Matematika dan Pembelajaran 5, no. 1 (2020): 11–19. http://dx.doi.org/10.36835/axi.v5i1.539.
Full textKotukh, Y., G. Khalimov, and М. Korobchinsky. "Construction of a three-parameter encryption scheme on Hermitian groups in the MST3 cryptosystem." Radiotekhnika, no. 213 (June 16, 2023): 49–55. http://dx.doi.org/10.30837/rt.2023.2.213.05.
Full textKotukh, Y., G. Khalimov, and M. Korobchinskyi. "Method of encryption in the MST3 cryptosystem based on Automorphisms group of Suzuki's functional field." Radiotekhnika, no. 215 (December 25, 2023): 46–59. http://dx.doi.org/10.30837/rt.2023.4.215.05.
Full textLabao, Alfonso, and Henry Adorna. "A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage." Cryptography 6, no. 1 (2022): 2. http://dx.doi.org/10.3390/cryptography6010002.
Full textHuang, Huawei, and Chunhua Li. "Tropical Cryptography Based on Multiple Exponentiation Problem of Matrices." Security and Communication Networks 2022 (September 9, 2022): 1–9. http://dx.doi.org/10.1155/2022/1024161.
Full textLuo, Hanguang, Guangjun Wen, and Jian Su. "An Efficient Hardware-Based Fault-Tolerant Method for SMS4." MATEC Web of Conferences 208 (2018): 02005. http://dx.doi.org/10.1051/matecconf/201820802005.
Full textKuznetsov, А. А., Y. І. Gorbenko, A. S. Kiian, А. А. Uvarova, and T. Y. Kuznetsova. "Comparative studies and analysis of efficiency code-based hybrid cryptosystem." Radiotekhnika, no. 195 (December 28, 2018): 61–69. http://dx.doi.org/10.30837/rt.2018.4.195.07.
Full textChandrakar, Yogita. "A Post-Quantum Secure and Covert Communication Framework: Hybrid Goppa Code-based Niederreiter Cryptosystem Integrated with LSB Image Steganography." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 07 (2025): 1–9. https://doi.org/10.55041/ijsrem51146.
Full textYang, Chou‐Chen, Ting‐Yi Chang, Jian‐Wei Li, and Min‐Shiang Hwang. "Simple Generalized Group‐Oriented Cryptosystems Using ElGamal Cryptosystem." Informatica 14, no. 1 (2003): 111–20. http://dx.doi.org/10.15388/informatica.2003.008.
Full textYassein, H. R., N. M. G. Al-Saidi, and A. K. Jabber. "A MULTI-DIMENSIONAL ALGEBRA FOR DESIGNING AN IMPROVED NTRU CRYPTOSYSTEM." EURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS 8, no. 4 (2020): 97–107. http://dx.doi.org/10.32523/2306-6172-2020-8-4-97-107.
Full textA., Manikandan, and Anandan R. "Hybrid Facial Chaotic-based Graphical Encryption Technique for Cloud Environment." Webology 19, no. 1 (2022): 3643–56. http://dx.doi.org/10.14704/web/v19i1/web19240.
Full textKotukh, Y., T. Okhrimenko, O. Dyachenko, N. Rotaneva, L. Kozina, and D. Zelenskyi. "Cryptanalysis of the system based on word problems using logarithmic signatures." Radiotekhnika, no. 206 (September 24, 2021): 106–14. http://dx.doi.org/10.30837/rt.2021.3.206.09.
Full textChen, Ling Jiao, and Ao Dong Shen. "A Novel Public Key Image Cryptosystem Based on Elliptic Curve and Arnold Cat Map." Advanced Materials Research 989-994 (July 2014): 4183–86. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4183.
Full textChen, Yansheng. "An evaluation of the discrete logarithm cryptosystem." Applied and Computational Engineering 30, no. 1 (2024): 208–16. http://dx.doi.org/10.54254/2755-2721/30/20230099.
Full textAgarwal, Sohit, and Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.
Full textIzzatul Nabila Sarbini, Tze Jin Wong, Lee Feng Koo, Ahmad Fadly Nurullah Rasedee, Fatin Hana Naning, and Mohammad Hasan Abdul Sathar. "Security Analysis on LUC-type Cryptosystems Using Common Modulus Attack." Journal of Advanced Research in Applied Sciences and Engineering Technology 29, no. 3 (2023): 206–13. http://dx.doi.org/10.37934/araset.29.3.206213.
Full textSingh, Rajesh P., Bhaba K. Sarma, and Anupam Saikia. "A Public Key Cryptosystem Using a Group of Permutation Polynomials." Tatra Mountains Mathematical Publications 77, no. 1 (2020): 139–62. http://dx.doi.org/10.2478/tmmp-2020-0013.
Full textRahman, Zain-Aldeen S. A., Basil H. Jasim, Yasir I. A. Al-Yasir, and Raed A. Abd-Alhameed. "Efficient Colour Image Encryption Algorithm Using a New Fractional-Order Memcapacitive Hyperchaotic System." Electronics 11, no. 9 (2022): 1505. http://dx.doi.org/10.3390/electronics11091505.
Full textZibideh, Walid Y., and Mustafa M. Matalgah. "Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time." International Journal of Information Security and Privacy 7, no. 1 (2013): 63–75. http://dx.doi.org/10.4018/jisp.2013010105.
Full textIlyenko, Anna, Sergii Ilyenko, and Olena Prokopenko. "THE IMPROVEMENT OF NTRUENCRYPT PUBLIC KEY CRYPTOSYSTEM: DESIGN AND PERFORMANCE EVALUATION." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 123–34. http://dx.doi.org/10.28925/2663-4023.2020.10.123134.
Full textAbdallah, Hanaa A., and Souham Meshoul. "A Multilayered Audio Signal Encryption Approach for Secure Voice Communication." Electronics 12, no. 1 (2022): 2. http://dx.doi.org/10.3390/electronics12010002.
Full textРадько, Николай Михайлович, Светлана Сергеевна Тихонова, and Александр Николаевич Мокроусов. "EVALUATION OF PERSISTENCE OF STREAMING CRYPTOSYSTEMS OPERATING AS PART OF TELECOMMUNICATIONS MANAGEMENT NETWORK SYSTEM." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 9, 2021): 47–62. http://dx.doi.org/10.36622/vstu.2021.24.1.005.
Full text