An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA

C Zhang, Y Liang, A Tavares, L Wang, T Gomes… - Symmetry, 2024 - mdpi.com
Due to its very desirable properties, Chebyshev polynomials are often used in the design of
public key cryptographic systems. This paper discretizes the Chebyshev map** …

[HTML][HTML] A password-based authentication approach for edge computing architectures

L Kenioua, B Lejdel, S Alamri, Q Ramadan - Egyptian Informatics Journal, 2024 - Elsevier
Due to its benefits of low delay and fast response, edge computing has become an essential
aid to cloud computing technology and has introduced new options for smart applications …

Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme

C Park, S Cho, YS Cho, S Kim, HT Lee - IEEE Access, 2024 - ieeexplore.ieee.org
Recently, Chait et al. proposed a new aggregate signature scheme under the RSA setting
(IEEE Access, 2023). In this paper, we show that Chait et al.'s aggregate signature scheme …

The development of signing and verification methods for high speed digital signatures on electronic official documents by using RSA cryptography

K Somsuk - Cogent Engineering, 2024 - Taylor & Francis
This research introduces an algorithm for signing and verifying digital signatures on
electronic official documents to establish the authenticity of a person's identification. The …

A Threshold-Blind Signature Scheme and its application in Blockchain-based Systems

V Reyes-Macedo, A Kawachi, G Gallegos-García… - IEEE …, 2024 - ieeexplore.ieee.org
In blockchain-based systems usually there are two common concerns: one of them is privacy
and other is key management. Besides privacy has been widely studied, nor key …

Intelligent Image Text Detection via Pixel Standard Deviation Representation.

SS Guia, A Laouid, M Hammoudeh… - … Systems Science & …, 2024 - search.ebscohost.com
Artificial intelligence has been involved in several domains. Despite the advantages of using
artificial intelligence techniques, some crucial limitations prevent them from being …

Impact of Post Quantum Digital Signatures On Block Chain: Comparative Analysis

MAR Javaid, M Ashraf, T Rehman… - The Asian Bulletin of Big …, 2024 - abbdm.com
The emergence of quantum computing poses a substantial risk to the security of block chain
technology, requiring a transition to post-quantum cryptography (PQC) to protect the future …

АЛГОРИТМ ШИФРУВАННЯ ДАНИХ З КОРЕКЦІЄЮ ПОМИЛОК

А ДАВЛЕТОВА - Herald of Khmelnytskyi National University …, 2024 - heraldts.khmnu.edu.ua
В роботі досліджено ефективність поєднання асиметричної криптосистеми з кодами
для корекції помилок з метою підвищення ефективності та безпеки обміну та зберігання …