The k′-Lucas sequence is a significant generalization of the classical Lucas sequence, exhibiting various intriguing properties and applications across mathematics and cryptography. The study of k′ -Lucas-like seque...
详细信息
Running traditional symmetric encryption algorithms, such as AES, on resource-constrained devices presents significant challenges due to the limited computational resources available. A common bottleneck in these algo...
详细信息
Computing in the cloud is a burgeoning sector that requires architectures that are both lightweight and safe. In this study, we suggest a strong hybrid structure that is created by fusing existing structures of HUMMIN...
详细信息
In this paper we study the effect of using small prime numbers within the Okamoto-Uchiyama public key encryption scheme. We introduce two novel versions and prove their security. Then we show how to choose the system...
详细信息
The rapid advancement of quantum computing poses significant challenges to classical cryptographic systems. In response, the National Institute of Standards and Technology (NIST) initiated a challenge to develop "...
详细信息
In an era where data security is paramount, this research presents MathCrypt, a novel symmetric encryption-decryption algorithm designed to address vulnerabilities in traditional cryptographic methods. Unlike conventi...
详细信息
In this paper, we have discussed isogeny-based cryptography as a rather appealing option for post-quantum security. We provide analysis of current protocols like SIDH (Supersingular Isogeny Diffie-Hellman) and SIKE (S...
详细信息
Code-based cryptography is based on the difficulty of the syndrome decoding problem (SDP) and is one of the promising candidates for post-quantum cryptography. Information set decoding (ISD) is known as one of th...
详细信息
Randomness is key to many of the protocols used in cryptography, various math algorithms, and communications. However, while it is widely used it is not well understood due to its mathematical nature and foundations. ...
详细信息
暂无评论