Sign Up to like & get
recommendations!
1
Published in 2017 at "Journal of Mathematical Sciences"
DOI: 10.1007/s10958-017-3362-z
Abstract: This work presents the results of an experimental study of some properties of low-order finite Abelian groups from the standpoint of the applicability of such groups in cryptographic applications.
read more here.
Keywords:
cryptographic applications;
comparing finite;
finite abelian;
abelian groups ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Scientific Reports"
DOI: 10.1038/s41598-020-58636-w
Abstract: Designing efficient and secure cryptosystems has been a preoccupation for many scientists and engineers for a long time wherein they use chaotic systems to design new cryptosystems. While one dimensional (1-D) chaotic maps possess powerful…
read more here.
Keywords:
inspired cascaded;
quantum walks;
quantum inspired;
cryptographic applications ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Mathematical Cryptology"
DOI: 10.1515/jmc-2015-0054
Abstract: Abstract Cryptographic primitives from coding theory are some of the most promising candidates for NIST’s Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a…
read more here.
Keywords:
dyadic operations;
cryptographic applications;
operations cryptographic;
designing efficient ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Academic Journal of Interdisciplinary Studies"
DOI: 10.2478/ajis-2019-0008
Abstract: Abstract Recently, not only the Internet and mobile devices are changing our daily life but also the usage of national biometric card for every government electronic services. Beside citizen authentication these electronic services require users…
read more here.
Keywords:
national biometric;
card match;
cryptographic applications;
match card ... See more keywords