Results (2)
Search Parameters:
Keyword: Public key cryptographyStream Cipher by Reed-Solomon Codes
by Tao Wu and Ruomei Wang
Advances in Science, Technology and Engineering Systems Journal,
Volume 3,
Issue 4,
Page # 26–32,
2018;
DOI: 10.25046/aj030404
Abstract:
Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…
Read More(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Matrix Encryption Scheme
Advances in Science, Technology and Engineering Systems Journal,
Volume 2,
Issue 4,
Page # 56–58,
2017;
DOI: 10.25046/aj020408
Abstract:
In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have…
Read More(This article belongs to Section Mathematics (MAT))
