Journal articles on the topic 'Discrete logarithm problem (DLP)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Discrete logarithm problem (DLP).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Han, Jiao, and Jincheng Zhuang. "DLP in semigroups: Algorithms and lower bounds." Journal of Mathematical Cryptology 16, no. 1 (2022): 278–88. http://dx.doi.org/10.1515/jmc-2021-0049.
Full textOunasser, Abid. "A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS." International Journal of Information Technology, Modeling and Computing (IJITMC) 4, no. 1 (2018): 01–06. https://doi.org/10.5281/zenodo.1404702.
Full textMa, Yanlong. "Cryptanalysis of the cryptosystems based on the generalized hidden discrete logarithm problem." Computer Science Journal of Moldova 32, no. 2(95) (2024): 289–307. http://dx.doi.org/10.56415/csjm.v32.15.
Full textManju, Sanghi. "New digital signature scheme based on MDLP and multinacci matrices." i-manager's Journal on Information Technology 12, no. 1 (2023): 1. http://dx.doi.org/10.26634/jit.12.1.19775.
Full textPote, Mrs Santoshi, and Mrs Jayashree Katti. "Attacks on Elliptic Curve Cryptography Discrete Logarithm Problem (EC-DLP)." IJIREEICE 3, no. 4 (2015): 127–31. http://dx.doi.org/10.17148/ijireeice.2015.3428.
Full textWronski, Michal, and Lukasz Dzierzkowski. "Base of exponent representation matters -- more efficient reduction of discrete logarithm problem and elliptic curve discrete logarithm problem to the QUBO problem." Quantum Information and Computation 24, no. 7&8 (2024): 541–64. http://dx.doi.org/10.26421/qic24.7-8-1.
Full textMuzereau, A., N. P. Smart, and F. Vercauteren. "The Equivalence between the DHP and DLP for Elliptic Curves Used in Practical Applications." LMS Journal of Computation and Mathematics 7 (2004): 50–72. http://dx.doi.org/10.1112/s1461157000001042.
Full textZajac, Pavol. "On the use of the lattice sieve in the 3D NFS." Tatra Mountains Mathematical Publications 45, no. 1 (2010): 161–72. http://dx.doi.org/10.2478/v10127-010-0012-y.
Full textKushwaha, Prabhat. "Improved lower bound for Diffie–Hellman problem using multiplicative group of a finite field as auxiliary group." Journal of Mathematical Cryptology 12, no. 2 (2018): 101–18. http://dx.doi.org/10.1515/jmc-2017-0053.
Full textTinani, Simran, and Joachim Rosenthal. "A deterministic algorithm for the discrete logarithm problem in a semigroup." Journal of Mathematical Cryptology 16, no. 1 (2022): 141–55. http://dx.doi.org/10.1515/jmc-2021-0022.
Full textDuc, Nguyen Tan, Nguyen Nam Hai, and Nguyen Hieu Minh. "Blind multi-signature scheme based on factoring and discrete logarithm problem." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 5 (2019): 2327–34. https://doi.org/10.12928/TELKOMNIKA.v17i5.10525.
Full textLuhaib, Qasim Mohsin, and Ruma Kareem K. Ajeena. "Elliptic curve matrices over group ring to improve elliptic curve–discrete logarithm cryptosystems." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 6 (2023): 1699–704. http://dx.doi.org/10.47974/jdmsc-1616.
Full textPauly, Jincy, Saju M.I., Antony John E.F., and Renjith Varghese. "A NEW DLP-BASED AUTHENTICATION ALGORITHM FOR PUBLIC KEY CRYPTOSYSTEMS." International Journal of Advanced Research 12, no. 11 (2024): 566–69. https://doi.org/10.21474/ijar01/19867.
Full textGoswami, Pinkimani, Madan Mohan Singh, and Bubu Bhuyan. "A new public key scheme based on DRSA and generalized GDLP." Discrete Mathematics, Algorithms and Applications 08, no. 04 (2016): 1650057. http://dx.doi.org/10.1142/s1793830916500579.
Full textNguyen, Kim Tuan, Ha Nguyen Hoang, and Duy Ho Ngoc. "A New Security Enhancing Solution when Building Digital Signature Schemes." Engineering, Technology & Applied Science Research 15, no. 3 (2025): 23613–21. https://doi.org/10.48084/etasr.10370.
Full textGoel, Neha, Indivar Gupta, and B. K. Dass. "Survey on SAP and its application in public-key cryptography." Journal of Mathematical Cryptology 14, no. 1 (2020): 144–52. http://dx.doi.org/10.1515/jmc-2016-0004.
Full textLi, Xiong, Jianwei Niu, Muhammad Khurram Khan, and Zhibo Wang. "Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme." Mathematical Problems in Engineering 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/910409.
Full textWannarisuk, Nongbsap, та Mohan Singh Madan. "A Cryptographic Application of the M-Injectivity of 𝑀𝑛(𝑍𝑝) Over Itself". International Journal of Recent Technology and Engineering (IJRTE) 10, № 4 (2021): 7–14. https://doi.org/10.35940/ijrte.D6515.1110421.
Full textAbd Ghafar, Amir Hamzah. "AN UPDATED CRYPTANALYSIS ON THE BFHP-DLP SIGNING SCHEME." Malaysian Journal of Science 41 (September 30, 2022): 1–8. http://dx.doi.org/10.22452/mjs.sp2022no1.1.
Full textNongbsap, Wannarisuk, та Dr Madan Mohan Singh. "A Cryptographic Application of the M-Injectivity of 𝑀𝑛(𝑍𝑝) Over Itself". International Journal of Recent Technology and Engineering (IJRTE) 10, № 4 (2021): 7–14. http://dx.doi.org/10.35940/ijrte.d6515.1110421.
Full textJunior Gabriel, Arome, Boniface Kayode Alese, Adebayo Olusola Adetunmbi, Olumide Sunday Adewale, and Oluwafemi Abimbola Sarumi. "Post-Quantum Crystography System for Secure Electronic Voting." Open Computer Science 9, no. 1 (2019): 292–98. http://dx.doi.org/10.1515/comp-2019-0018.
Full textPomykała, Jacek, and Sławomir Barabasz. "Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers." Fundamenta Informaticae 69, no. 4 (2006): 411–25. https://doi.org/10.3233/fun-2006-69403.
Full textPauly, Jincy, M. I. Saju, Renjith Varghese, and E. F. Antony John. "Design of public key cryptosystem based on the underlying mathematical complexity." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 3 (2025): 973–79. https://doi.org/10.47974/jdmsc-2239.
Full textPaul, Kamakhya, Pinkimani Goswami, and Madan Mohan Singh. "SECURITY OF PUBLIC KEY ENCRYPTION USING DICKSON POLYNOMIALS OVER FINITE FIELD WITH 2k." jnanabha 53, no. 02 (2023): 74–78. http://dx.doi.org/10.58250/jnanabha.2023.53209.
Full textChande, Manoj Kumar, and Balwant Singh Thakur. "Proxy-Protected Proxy Multi-Signature Based on Elliptic Curve." International Journal of Informatics and Communication Technology (IJ-ICT) 3, no. 1 (2014): 67. http://dx.doi.org/10.11591/ijict.v3i1.pp67-72.
Full textWei, Bao Dian. "A Provably Secure ID-Based Designated Verifier Proxy Signature Scheme Based on DLP." Applied Mechanics and Materials 411-414 (September 2013): 721–24. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.721.
Full textBao, Hai Yong, Man De Xie, Zhen Fu Cao, and Shan Shan Hong. "Signature-Encryption Scheme: A Novel Solution to Mobile Computation." Advanced Materials Research 546-547 (July 2012): 1415–20. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1415.
Full textZhang, Jing, Ya-Juan Yang, and Yi-Peng Li. "A New Key Exchange Protocol Based on Infinite Non-Abelian Groups." Security and Communication Networks 2022 (March 24, 2022): 1–6. http://dx.doi.org/10.1155/2022/7942353.
Full textPetrenko, Alexei, and Sergei Petrenko. "Basic Algorithms Quantum Cryptanalysis." Voprosy kiberbezopasnosti, no. 1(53) (2023): 100–115. http://dx.doi.org/10.21681/2311-3456-2023-1-100-115.
Full textAstawa, I. Made Mustika Kerta, and Rahmi Nurazizah. "ANALISIS ATRIBUT KEAMANAN TERHADAP PERBAIKAN PROTOKOL GROUP KEY TRANSFER : PROTOKOL HSU." Jurnal Ilmiah Matematika dan Pendidikan Matematika 9, no. 1 (2017): 13. http://dx.doi.org/10.20884/1.jmp.2017.9.1.2851.
Full textFotiadis, Georgios, and Elisavet Konstantinou. "Generating pairing-friendly elliptic curve parameters using sparse families." Journal of Mathematical Cryptology 12, no. 2 (2018): 83–99. http://dx.doi.org/10.1515/jmc-2017-0024.
Full textPartala, Juha. "Algebraic generalization of Diffie–Hellman key exchange." Journal of Mathematical Cryptology 12, no. 1 (2018): 1–21. http://dx.doi.org/10.1515/jmc-2017-0015.
Full textPetrenko, Alexei, and Sergei Petrenko. "Quantum Resilience Estimation Method Blockchain." Voprosy kiberbezopasnosti, no. 3(49) (2022): 2–22. http://dx.doi.org/10.21681/2311-3456-2022-3-2-22.
Full textKuang, Fengtian, Bo Mi, Yang Li, Yuan Weng, and Shijie Wu. "Multiparty Homomorphic Machine Learning with Data Security and Model Preservation." Mathematical Problems in Engineering 2021 (January 11, 2021): 1–11. http://dx.doi.org/10.1155/2021/6615839.
Full textPandey, Atul, Indivar Gupta, and Dhiraj Kumar Singh. "Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings." Journal of Mathematical Cryptology 15, no. 1 (2020): 266–79. http://dx.doi.org/10.1515/jmc-2019-0054.
Full textLiu, Shanpeng, Xiong Li, Fan Wu, Junguo Liao, Jin Wang, and Dingbao Lin. "A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks." Electronics 8, no. 9 (2019): 939. http://dx.doi.org/10.3390/electronics8090939.
Full textFan, Jing, Xuejun Fan, Ningning Song, and Long Wang. "Hyperelliptic Covers of Different Degree for Elliptic Curves." Mathematical Problems in Engineering 2022 (July 4, 2022): 1–11. http://dx.doi.org/10.1155/2022/9833393.
Full textZhang, Ping, Jinbo Li, and Zhumu Fu. "Public Key Encryption with Equality Test in a Cloud Environment." Information 13, no. 6 (2022): 265. http://dx.doi.org/10.3390/info13060265.
Full textTakieldeen, Ali, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed, and Fahmi Khalifa. "A Robust and Hybrid Cryptosystem for Identity Authentication." Information 12, no. 3 (2021): 104. http://dx.doi.org/10.3390/info12030104.
Full textFaleh, May Adnan, Mohammed Yousif, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, and Mansour Obaidat. "CSAS-V: Certificateless Schnorr Aggregate Signature for VANETs." International Journal of Innovative Research and Scientific Studies 8, no. 2 (2025): 4000–4011. https://doi.org/10.53894/ijirss.v8i2.6200.
Full textHagras, Esam A. A., Saad Aldosary, Haitham Khaled, and Tarek M. Hassan. "Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application." Sensors 23, no. 14 (2023): 6589. http://dx.doi.org/10.3390/s23146589.
Full textMUSTAFA, HUSSEIN, ELHADY MAHMOUD ABD, HAMDY SARA, and ALSOBKY WAGEDA. "DESIGNING NEW TECHNIQUE IN DIGITAL SIGNATURE BASED ON GALOIS FIELD 2n AND CHAOTIC MAPS." Seybold Report Journal 18, no. 09 (2023): 53–72. https://doi.org/10.5281/zenodo.8344314.
Full textShomen, Deb, and Mokammel Haque Md. "Elliptic curve and pseudo-inverse matrix based cryptosystem for wireless sensor networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4479–92. https://doi.org/10.11591/ijece.v9i5.pp4479-4492.
Full textTvarijonas, Povilas, Gediminas Simonas Dosinas, and Eligijus Sakalauskas. "Discrete logarithm problem in matrix." Lietuvos matematikos rinkinys 46 (September 21, 2023): 112–15. http://dx.doi.org/10.15388/lmr.2006.30588.
Full textYang, Junchi. "Discrete logarithms and primitive roots: Algorithms, properties, and typical solution methods." Theoretical and Natural Science 13, no. 1 (2023): 95–101. http://dx.doi.org/10.54254/2753-8818/13/20240801.
Full textBlackburn, Simon R., and Sam Scott. "The discrete logarithm problem for exponents of bounded height." LMS Journal of Computation and Mathematics 17, A (2014): 148–56. http://dx.doi.org/10.1112/s1461157014000230.
Full textMoldovyan, Alexandr, and Nikolay Moldovyan. "New Forms of Defining the Hidden Discrete Logarithm Problem." SPIIRAS Proceedings 18, no. 2 (2019): 504–29. http://dx.doi.org/10.15622/sp.18.2.504-529.
Full textWang, Su Li, and Jun Yao Ye. "Applied-Information Technology in Certificateless Proxy Signature Scheme without Bilinear Pairings." Applied Mechanics and Materials 685 (October 2014): 532–35. http://dx.doi.org/10.4028/www.scientific.net/amm.685.532.
Full textTsujii, S., T. Itoh, and K. Kurosawa. "ID-based cryptosystem using discrete logarithm problem." Electronics Letters 23, no. 24 (1987): 1318. http://dx.doi.org/10.1049/el:19870912.
Full textPadmavathy, R., and Chakravarthy Bhagvati. "Discrete logarithm problem using index calculus method." Mathematical and Computer Modelling 55, no. 1-2 (2012): 161–69. http://dx.doi.org/10.1016/j.mcm.2011.02.022.
Full text