In OFB mode, the output of the cryptographic algorithm is fed back to the input of the cryptographic algorithm. The OFB mode does not directly encrypt plaintext through cryptographic algorithms, but generates cipherte...
详细信息
We provide explicit radical N-isogeny formulae for all odd integers N. The formulae are compact closed-form expressions which require one Nth root computation and O(N) basic field operations. The formulae are highly e...
详细信息
All digital information exchange is not free from security threats in terms of information exchange, so a technique or method is needed to make message exchange in today's all-digital era safer. Therefore, this re...
详细信息
Since the arrival of devices connected to the Internet, cryptographic goals have become a constant challenge for cybersecurity specialists. Data transmitted between IoT devices can become sensitive depending on the ap...
详细信息
R-Ate pair is an important bilinear mapping in state secret SM9 cryptographic algorithm, and its computational efficiency is closely related to the implementation performance of SM9. This scheme uses variable-length M...
详细信息
An end-to-end encrypted chatting application focuses on securely transmitting sensitive information. It prevents the intrusion of malicious parties with any ill intent. It is especially needed in organizations where e...
详细信息
The paper describes the construction of nonlinear cryptographic protocol, based on separate linear cryptosystems. Implementation of suggested construction scheme enables encryption of data blocks with ready-made and p...
详细信息
Today, hashing algorithms are employed in many applications for security purposes. Many developments have been made in the family of hashing algorithms, especially the SHA1 algorithm. Because of flaws in the past year...
详细信息
Due to the advent of polynomial time quantum algorithms to solve well-known hard mathematical problems, various secure cryptographic primitives are vulnerable against large quantum computers. However, no such quantum ...
详细信息
In this paper we construct a new efficient updatable encryption (UE) scheme based on FrodoPKE learning with errors key encapsulation [1]. We analyse the security of the proposed scheme in the backward-leak uni-directi...
详细信息
暂无评论