Search
Search Results
-
A new group-oriented publicly veriablethreshold signcryption scheme
Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes, it is found that the improved scheme can...
-
A quantum multiple access communications scheme using orbital angular momentum
We propose a quantum multiple access communications scheme using Orbital Angular Momentum (OAM) sector states in the paper. In the scheme, each user...
-
Performance of a new decoding method used in open-loop all-optical chaotic communication system
A new decoding method with decoder is used in open-loop all-optical chaotic communication system under strong injection condition. The performance of...
-
Self-certified multi-proxy signature schemes with message recovery
Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must...
-
Cryptanalysis of an image encryption scheme based on the Hill cipher
This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al. , 2006) and reports its following problems: (1)...
-
Comments on “How to repair the Hill cipher”
A modification of the Hill cipher algorithm was recently proposed by Ismail et al. (2006), who claimed that their new scheme could offer more security...
-
A new labeling search algorithm for Bit-Interleaved Coded Modulation with Iterative Decoding
Bit-Interleaved Coded Modulation with Iterative Decoding (BICM-ID) is a bandwidth efficient transmission, where the bit error rate is reduced through...
-
Multiple hashes of single key with passcode for multiple accounts
A human’s e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these...
-
Protection of mobile location privacy by using blind signature
Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can...