Articles with "cryptographic applications" as a keyword



Photo from archive.org

Comparing Finite Abelian Groups from the Standpoint of Their Cryptographic Applications

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Mathematical Sciences"

DOI: 10.1007/s10958-017-3362-z

Abstract: This work presents the results of an experimental study of some properties of low-order finite Abelian groups from the standpoint of the applicability of such groups in cryptographic applications. read more here.

Keywords: cryptographic applications; comparing finite; finite abelian; abelian groups ... See more keywords
Photo from wikipedia

Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications

Sign Up to like & get
recommendations!
Published in 2020 at "Scientific Reports"

DOI: 10.1038/s41598-020-58636-w

Abstract: Designing efficient and secure cryptosystems has been a preoccupation for many scientists and engineers for a long time wherein they use chaotic systems to design new cryptosystems. While one dimensional (1-D) chaotic maps possess powerful… read more here.

Keywords: inspired cascaded; quantum walks; quantum inspired; cryptographic applications ... See more keywords
Photo from academic.microsoft.com

Designing Efficient Dyadic Operations for Cryptographic Applications

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Mathematical Cryptology"

DOI: 10.1515/jmc-2015-0054

Abstract: Abstract Cryptographic primitives from coding theory are some of the most promising candidates for NIST’s Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a… read more here.

Keywords: dyadic operations; cryptographic applications; operations cryptographic; designing efficient ... See more keywords
Photo by katemacate from unsplash

Efficiency Comparison of Cryptographic Applications, Match-off-Card vs. Match-on-Card, Using National Biometric eID Card

Sign Up to like & get
recommendations!
Published in 2019 at "Academic Journal of Interdisciplinary Studies"

DOI: 10.2478/ajis-2019-0008

Abstract: Abstract Recently, not only the Internet and mobile devices are changing our daily life but also the usage of national biometric card for every government electronic services. Beside citizen authentication these electronic services require users… read more here.

Keywords: national biometric; card match; cryptographic applications; match card ... See more keywords