Journal articles on the topic 'Multivariate cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 45 journal articles for your research on the topic 'Multivariate cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Singh, Rajesh P., Bhaba K. Sarma, and Anupam Saikia. "A Public Key Cryptosystem Using a Group of Permutation Polynomials." Tatra Mountains Mathematical Publications 77, no. 1 (2020): 139–62. http://dx.doi.org/10.2478/tmmp-2020-0013.
Full textLi, Weijian, Xian Huang, Huimin Zhao, Guoliang Xie, and Fuxiang Lu. "Fuzzy Matching Template Attacks on Multivariate Cryptography: A Case Study." Discrete Dynamics in Nature and Society 2020 (June 20, 2020): 1–11. http://dx.doi.org/10.1155/2020/9475782.
Full textNIE, Xu-Yun, Zhao-Hu XU, Yong-Jian LIAO, and Ting ZHONG. "Cryptanalysis of Extended Multivariate Public Key Cryptosystem." Chinese Journal of Computers 36, no. 6 (2014): 1177–82. http://dx.doi.org/10.3724/sp.j.1016.2013.01177.
Full textYuan, Feng, Hai Wen Ou, and Sheng Wei Xu. "A New Public Key Cryptographic Scheme." Applied Mechanics and Materials 303-306 (February 2013): 1944–47. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.1944.
Full textSelvakumar, K., and S. Naveen Kumar. "Multivariate Quadratic Quasigroup Polynomial based Cryptosystem in Vanet." International Journal of Engineering & Technology 7, no. 4.10 (2018): 832. http://dx.doi.org/10.14419/ijet.v7i4.10.26767.
Full textSmith-Tone, Daniel, and Cristina Tone. "A multivariate cryptosystem inspired by random linear codes." Finite Fields and Their Applications 69 (January 2021): 101778. http://dx.doi.org/10.1016/j.ffa.2020.101778.
Full textHuixian, Li, Gao Jin, Wang Lingyun, and Pang Liaojun2. "MPKC-based Threshold Proxy Signcryption Scheme." International Arab Journal of Information Technology 17, no. 2 (2019): 196–206. http://dx.doi.org/10.34028/iajit/17/2/7.
Full textSingh, Rajesh P., Anupam Saikia, and Sarma B. K. "Little Dragon Two: An efficient Multivariate Public Key Cryptosystem." International journal of Network Security & Its Applications 2, no. 2 (2010): 1–10. http://dx.doi.org/10.5121/ijnsa.2010.2201.
Full textSun, Xiaoyan, Maosheng Zhang, Shaowu Mao, Zhengwei Ren, and Huanguo Zhang. "Software watermarking scheme based on multivariate public key cryptosystem." Wuhan University Journal of Natural Sciences 21, no. 3 (2016): 257–61. http://dx.doi.org/10.1007/s11859-016-1168-3.
Full textSun, Yan Jun, Chang Ming Liu, Hai Yu Li, and Zhe Yuan. "One-Way Function Construction Based on the MQ Problem and Logic Function." Applied Mechanics and Materials 220-223 (November 2012): 2360–63. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2360.
Full textGhadbane, Nacer. "On Public-key Cryptosystem Based on the Problem of Solving a Non-Linear System of Polynomial Equations." WSEAS TRANSACTIONS ON COMPUTER RESEARCH 8 (June 25, 2020): 106–10. http://dx.doi.org/10.37394/232018.2020.8.13.
Full textWang, Ling Ling. "A New Multivariate-Based Ring Signature Scheme." Applied Mechanics and Materials 347-350 (August 2013): 2688–92. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2688.
Full textYuan, Feng, Hai Wen Ou, and Sheng Wei Xu. "Security Analysis of Square Minus Scheme." Applied Mechanics and Materials 321-324 (June 2013): 2669–73. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2669.
Full textTao, Chengdong, Hong Xiang, Albrecht Petzoldt, and Jintai Ding. "Simple Matrix – A Multivariate Public Key Cryptosystem (MPKC) for Encryption." Finite Fields and Their Applications 35 (September 2015): 352–68. http://dx.doi.org/10.1016/j.ffa.2015.06.001.
Full textSingaravelu, Pradheepkumar, and Shekhar Verma. "Performance analysis of multivariate cryptosystem schemes for wireless sensor network." Computers & Electrical Engineering 39, no. 6 (2013): 1880–93. http://dx.doi.org/10.1016/j.compeleceng.2012.07.010.
Full textWang, Ling Ling. "A Verifiable Ring Signature Scheme Based on Multivariate Public-Key Cryptosystem." Applied Mechanics and Materials 380-384 (August 2013): 1899–902. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1899.
Full textWANG, Yacheng, Yasuhiko IKEMATSU, Dung Hoang DUONG, and Tsuyoshi TAKAGI. "The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 9 (2019): 1028–36. http://dx.doi.org/10.1587/transfun.e102.a.1028.
Full textWang, Xin, and Bo Yang. "An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack." Mathematical Biosciences and Engineering 16, no. 6 (2019): 7734–50. http://dx.doi.org/10.3934/mbe.2019388.
Full textTSUJII, Shigeo, Kohtaro TADAKI, Ryo FUJITA, and Masahito GOTAISHI. "Proposal of the Multivariate Public Key Cryptosystem Relying on the Difficulty of Factoring a Product of Two Large Prime Numbers." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E99.A, no. 1 (2016): 66–72. http://dx.doi.org/10.1587/transfun.e99.a.66.
Full textUstimenko, V. A. "On new multivariate cryptosystems based on hidden Eulerian equations." Reports of the National Academy of Sciences of Ukraine, no. 5 (May 23, 2017): 17–24. http://dx.doi.org/10.15407/dopovidi2017.05.017.
Full textLuo, Yuling, Shunsheng Zhang, Junxiu Liu, and Lvchen Cao. "Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks." International Journal of Bifurcation and Chaos 30, no. 15 (2020): 2050223. http://dx.doi.org/10.1142/s0218127420502235.
Full textLiu, Mingjie, Lidong Han, and Xiaoyun Wang. "On the equivalent keys in multivariate cryptosystems." Tsinghua Science and Technology 16, no. 3 (2011): 225–32. http://dx.doi.org/10.1016/s1007-0214(11)70033-5.
Full textGao, Shuhong, and Raymond Heindl. "Multivariate public key cryptosystems from diophantine equations." Designs, Codes and Cryptography 67, no. 1 (2011): 1–18. http://dx.doi.org/10.1007/s10623-011-9582-1.
Full textKumar, Manish. "Quantum Computing and Post Quantum Cryptography." International Journal of Innovative Research in Physics 2, no. 4 (2021): 37–51. http://dx.doi.org/10.15864/ijiip.2405.
Full textHASHIMOTO, Yasufumi, Tsuyoshi TAKAGI, and Kouichi SAKURAI. "General Fault Attacks on Multivariate Public Key Cryptosystems." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96.A, no. 1 (2013): 196–205. http://dx.doi.org/10.1587/transfun.e96.a.196.
Full textSingaravelu, Pradheepkumar, Shekhar Verma, and Charles A. Shoniregun. "Feasibility of position-based multivariate cryptosystems for WSN." International Journal of Internet Technology and Secured Transactions 4, no. 2/3 (2012): 237. http://dx.doi.org/10.1504/ijitst.2012.047967.
Full textUstimenko, Vasyl. "Explicit constructions of extremal graphs and new multivariate cryptosystems." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (2015): 185–204. http://dx.doi.org/10.1556/012.2015.52.2.1312.
Full textChen, Jiahui, Jie Ling, Jianting Ning, and Jintai Ding. "Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems." Computer Journal 62, no. 8 (2019): 1132–47. http://dx.doi.org/10.1093/comjnl/bxz013.
Full textWang, HouZhen, HuanGuo Zhang, ZhangYi Wang, and Ming Tang. "Extended multivariate public key cryptosystems with secure encryption function." Science China Information Sciences 54, no. 6 (2011): 1161–71. http://dx.doi.org/10.1007/s11432-011-4262-3.
Full textWang, Shangping, Rui Ma, Yaling Zhang, and Xiaofeng Wang. "Ring signature scheme based on multivariate public key cryptosystems." Computers & Mathematics with Applications 62, no. 10 (2011): 3973–79. http://dx.doi.org/10.1016/j.camwa.2011.09.052.
Full textKandiy, S. O., and G. A. Maleeva. "Analysis of the complexity of attacks on multivariate cryptographic transformations using algebraic field structure." Radiotekhnika, no. 204 (April 9, 2021): 59–65. http://dx.doi.org/10.30837/rt.2021.1.204.06.
Full textDING, JINTAI, TIMOTHY J. HODGES, VICTORIA KRUGLOV, DIETER SCHMIDT, and STEFAN TOHǍNEANU. "GROWTH OF THE IDEAL GENERATED BY A QUADRATIC MULTIVARIATE FUNCTION OVER GF(3)." Journal of Algebra and Its Applications 12, no. 05 (2013): 1250219. http://dx.doi.org/10.1142/s0219498812502192.
Full textUstimenko, Vasyl. "On the Families of Stable Multivariate Transformations of Large Order and Their Cryptographical Applications." Tatra Mountains Mathematical Publications 70, no. 1 (2017): 107–17. http://dx.doi.org/10.1515/tmmp-2017-0021.
Full textHASHIMOTO, Yasufumi. "Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E100.A, no. 1 (2017): 18–25. http://dx.doi.org/10.1587/transfun.e100.a.18.
Full textTSUJII, S., K. TADAKI, and R. FUJITA. "Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 5 (2007): 992–99. http://dx.doi.org/10.1093/ietfec/e90-a.5.992.
Full textUstimenko, Vasyl, and Oleksandr Pustovit. "On effective computations in subsemigroups of affine Cremona semigroup and implentations of new postquantum multivariate cryptosystems." Physico-mathematical modelling and informational technologies, no. 32 (July 6, 2021): 27–31. http://dx.doi.org/10.15407/fmmit2021.32.050.
Full textDING, JINTAI, and TIMOTHY HODGES. "CRYPTANALYSIS OF AN IMPLEMENTATION SCHEME OF THE TAMED TRANSFORMATION METHOD CRYPTOSYSTEM." Journal of Algebra and Its Applications 03, no. 03 (2004): 273–82. http://dx.doi.org/10.1142/s0219498804000861.
Full textYesina, M. V., S. O. Kandiy, E. V. Ostryanska, and I. D. Gorbenko. "Generation of general system parameters for Rainbow electronic signature scheme for 384 and 512 security bits." Radiotekhnika, no. 204 (April 9, 2021): 16–23. http://dx.doi.org/10.30837/rt.2021.1.204.02.
Full textSingh, Rajesh P., A. Saikia, and B. K. Sarma. "Poly-Dragon: an efficient multivariate public key cryptosystem." Journal of Mathematical Cryptology 4, no. 4 (2011). http://dx.doi.org/10.1515/jmc.2011.002.
Full textHarayama, Tomohiro, and Donald K. Friesen. "Weil sum for birthday attack in multivariate quadratic cryptosystem." Mathematical Cryptology 1, no. 1 (2007). http://dx.doi.org/10.1515/jmc.2007.006.
Full textDai, Songsong. "Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network." IEEE Transactions on Neural Networks and Learning Systems, 2021, 1–5. http://dx.doi.org/10.1109/tnnls.2021.3059434.
Full textHuang, Ning. "Analysis of a Multivariate Public Key Cryptosystem and Its Application in Software Copy Protection." Journal of Software 9, no. 8 (2014). http://dx.doi.org/10.4304/jsw.9.8.2010-2017.
Full textAlam, Bilal, Ferruh Özbudak, and Oğuz Yayla. "Classes of weak Dembowski–Ostrom polynomials for multivariate quadratic cryptosystems." Journal of Mathematical Cryptology 9, no. 1 (2015). http://dx.doi.org/10.1515/jmc-2013-0019.
Full textUstimenko, Vasyl. "On Multivariate Cryptosystems Based on Computable Maps with Invertible Decomposition." Annales UMCS, Informatica 14, no. 1 (2014). http://dx.doi.org/10.2478/umcsinfo-2014-0001.
Full textRomańczuk, Urszula, and Vasyl Ustimenko. "On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2." Annales UMCS, Informatica 12, no. 3 (2012). http://dx.doi.org/10.2478/v10065-012-0029-8.
Full text