Search
Search Results
-
Using General Large Language Models to Classify Mathematical Documents
In this article we report on an initial exploration to assess the viability of using the general large language models (LLMs), recently made public,... -
On One-Way Ring Homomorphisms
In this paper, we propose a new candidate for a one-way ring homomorphism induced by a one-way (non-Abelian) group homomorphism. A multi-party...
-
Lattice-Based Cryptography: A Survey
Most of current public key cryptosystems would be vulnerable to the attacks of the future quantum computers. Post-quantum cryptography offers...
-
A novel threshold changeable secret sharing scheme
A ( t, n ) threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty computing. In...
-
On those Boolean functions that are coset leaders of first order Reed-Muller codes
In this paper, we study the class of those Boolean functions that are coset leaders of first order Reed-Muller codes. We study their properties and...
-
New Constructions of Orbit Codes Based on the Operations of Orbit Codes
An orbit code is a special constant dimension subspace code, which is an orbit of a subgroup of a general linear group acting on the set of all...
-
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder
We propose a new encoding algorithm for the simultaneous differential multidimensional scalar point multiplication algorithm d-MUL. Previous... -
Modifying the Tropical Version of Stickel’s Key Exchange Protocol
A tropical version of Stickel’s key exchange protocol was suggested by Grigoriev and Shpilrain (2014) and successfully attacked by Kotov and Ushakov...
-
Enhancing an Attack to DSA Schemes
In this paper, we improve the theoretical background of the attacks on the DSA schemes of a previous paper, and we present some new more practical... -
Expander-Based Cryptography Meets Natural Proofs
We introduce new forms of attack on expander-based cryptography , and in particular on Goldreich’s pseudorandom generator and one-way function. Our...
-
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing
We study the power of preprocessing adversaries in finding bounded-length collisions in the widely used Merkle-Damgård (MD) hashing in the random...
-
Pairing-Based Cryptography on Elliptic Curves
We give a brief overview of a recent branch of Public Key Cryptography, the so called Pairing-based Cryptography or Identity-based Cryptography. We...
-
The Discrete Logarithm Problem Over Prime Fields: The Safe Prime Case. The Smart Attack, Non-Canonical Lifts and Logarithmic Derivatives
We connect the discrete logarithm problem over prime fields in the safe prime case to the logarithmic derivative.
-
Boolean Functions: Degree and Support
In this paper we establish some properties about Boolean functions that allow us to relate their degree and their support. These properties allow us...
-
On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings
Statistical Zero-knowledge proofs (Goldwasser et al . in SICOMP: SIAM J Comput,
1989 ) allow a computationally unbounded server to convince a... -
Constructions for key distribution patterns
Key distribution patterns (KDPs) are finite incidence structures satisfying a certain property which makes them widely used in minimizing the key...
-
On the GF(p) linear complexity of Hall’s sextic sequences and some cyclotomic-set-based sequences
Klapper (1994) showed that there exists a class of geometric sequences with the maximal possible linear complexity when considered as sequences over GF ...
-
Construction of balanced Boolean functions with high nonlinearity, good local and global avalanche characteristics
Boolean functions possessing multiple cryptographic criteria play an important role in the design of symmetric cryptosystems. The following criteria...
-
Scientometric dimensions of cryptographic research
Information security has been a crucial issue in modern information management; thus cryptographic techniques have become inevitable to safeguard...