An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA
C Zhang, Y Liang, A Tavares, L Wang, T Gomes… - Symmetry, 2024 - mdpi.com
Due to its very desirable properties, Chebyshev polynomials are often used in the design of
public key cryptographic systems. This paper discretizes the Chebyshev map** …
public key cryptographic systems. This paper discretizes the Chebyshev map** …
[HTML][HTML] A password-based authentication approach for edge computing architectures
Due to its benefits of low delay and fast response, edge computing has become an essential
aid to cloud computing technology and has introduced new options for smart applications …
aid to cloud computing technology and has introduced new options for smart applications …
Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme
C Park, S Cho, YS Cho, S Kim, HT Lee - IEEE Access, 2024 - ieeexplore.ieee.org
Recently, Chait et al. proposed a new aggregate signature scheme under the RSA setting
(IEEE Access, 2023). In this paper, we show that Chait et al.'s aggregate signature scheme …
(IEEE Access, 2023). In this paper, we show that Chait et al.'s aggregate signature scheme …
The development of signing and verification methods for high speed digital signatures on electronic official documents by using RSA cryptography
K Somsuk - Cogent Engineering, 2024 - Taylor & Francis
This research introduces an algorithm for signing and verifying digital signatures on
electronic official documents to establish the authenticity of a person's identification. The …
electronic official documents to establish the authenticity of a person's identification. The …
A Threshold-Blind Signature Scheme and its application in Blockchain-based Systems
In blockchain-based systems usually there are two common concerns: one of them is privacy
and other is key management. Besides privacy has been widely studied, nor key …
and other is key management. Besides privacy has been widely studied, nor key …
Intelligent Image Text Detection via Pixel Standard Deviation Representation.
Artificial intelligence has been involved in several domains. Despite the advantages of using
artificial intelligence techniques, some crucial limitations prevent them from being …
artificial intelligence techniques, some crucial limitations prevent them from being …
Impact of Post Quantum Digital Signatures On Block Chain: Comparative Analysis
MAR Javaid, M Ashraf, T Rehman… - The Asian Bulletin of Big …, 2024 - abbdm.com
The emergence of quantum computing poses a substantial risk to the security of block chain
technology, requiring a transition to post-quantum cryptography (PQC) to protect the future …
technology, requiring a transition to post-quantum cryptography (PQC) to protect the future …
АЛГОРИТМ ШИФРУВАННЯ ДАНИХ З КОРЕКЦІЄЮ ПОМИЛОК
А ДАВЛЕТОВА - Herald of Khmelnytskyi National University …, 2024 - heraldts.khmnu.edu.ua
В роботі досліджено ефективність поєднання асиметричної криптосистеми з кодами
для корекції помилок з метою підвищення ефективності та безпеки обміну та зберігання …
для корекції помилок з метою підвищення ефективності та безпеки обміну та зберігання …