In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have constructed an abelian group and, for the cryptographic part in this unreliable group, we then perform the computation corresponding to the algebraic equations, Returning the encrypted result to a receiver. Upon receipt of the result, the receiver can retrieve the sender’s clear message by performing the inverse calculation
[[abstract]]The theory of generalized inverses of matrices over finite fields has been proposed as a...
We present an efficient algorithm to compute a discrete logarithm in a finite nilpotent group, or mo...
We propose a public key cryptosystem based on block upper triangular matrices. This system is a vari...
Information security is an important issue. Hill Cipher is one of the most famous symmetric cryptosy...
Abstract:- We propose a public key cryptosystem based on block upper triangular matrices. This syste...
This work was partially supported by the Spanish grants GV06/018 Abstract:- This paper describes a n...
Abstract:- The system we propose is a mathematical problem with the necessary properties to define p...
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm p...
Hill Cipher is a first polygraphic substitution cipher that works on digraphs, trigraphs (3 letter s...
Abstract:- We describe a new public key cryptosystem using block upper triangular matrices with elem...
Abstract: The Hill cipher algorithm is one of the symmetric key algorithms that have several advanta...
This paper presents a symmetric cipher that is actually a variation of the Hill cipher. The new sche...
Abstract:- The aim of this paper is to give the new generation of the sets of matrices, which are is...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
Abstract — The role of cryptography in today’s world is significant. It secures information mathemat...
[[abstract]]The theory of generalized inverses of matrices over finite fields has been proposed as a...
We present an efficient algorithm to compute a discrete logarithm in a finite nilpotent group, or mo...
We propose a public key cryptosystem based on block upper triangular matrices. This system is a vari...
Information security is an important issue. Hill Cipher is one of the most famous symmetric cryptosy...
Abstract:- We propose a public key cryptosystem based on block upper triangular matrices. This syste...
This work was partially supported by the Spanish grants GV06/018 Abstract:- This paper describes a n...
Abstract:- The system we propose is a mathematical problem with the necessary properties to define p...
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm p...
Hill Cipher is a first polygraphic substitution cipher that works on digraphs, trigraphs (3 letter s...
Abstract:- We describe a new public key cryptosystem using block upper triangular matrices with elem...
Abstract: The Hill cipher algorithm is one of the symmetric key algorithms that have several advanta...
This paper presents a symmetric cipher that is actually a variation of the Hill cipher. The new sche...
Abstract:- The aim of this paper is to give the new generation of the sets of matrices, which are is...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
Abstract — The role of cryptography in today’s world is significant. It secures information mathemat...
[[abstract]]The theory of generalized inverses of matrices over finite fields has been proposed as a...
We present an efficient algorithm to compute a discrete logarithm in a finite nilpotent group, or mo...
We propose a public key cryptosystem based on block upper triangular matrices. This system is a vari...