Public Key Cryptosystem Based on Singular Matrix

M Maxrizal - Trends in Sciences, 2022 - tis.wu.ac.th
The algorithms such as RSA, ElGamal and ECC work on integers. Commutative operations
on integer multiplication leave these algorithms vulnerable to attack by eavesdroppers. For …

Feature oriented fuzzy logic based web spam detection

T Singh, M Kumari, S Mahajan - Journal of Information and …, 2017 - Taylor & Francis
With Internet becoming an inevitable part of the global community and the huge amount of
data resources present on the internet, the problem of malicious content present has …

Generalization of Public Key Cryptosystem Based on Singular Matrix Using Ring of Integer Modulo

BDA Prayanti - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
In this research, we modify the cryptosystem from a ring over an integer to an integer modulo
m. In the previous research, the researcher used a singular matrix over integers so that the …

Nonsingular matrix as private key on ElGamal cryptosystem

S Irawadi - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
The ElGamal cryptosystem is an asymmetric cryptosystem using commutative algebra.
Currently, applications of commutative algebra are very vulnerable to attack. For this reason …

Intelligent encryption algorithm for cloud computing user behavior feature data

K Ye, M Ng - Journal of Intelligent & Fuzzy Systems, 2018 - content.iospress.com
When the current algorithm encrypts cloud computing user behavior data, it cannot
effectively resist external attacks. When there are many feature data, the encryption …

Discrete Logarithmic Improvement for ElGamal Cryptosystem Using Matrix Concepts

S Irawadi - 2020 8th International Conference on Cyber and …, 2020 - ieeexplore.ieee.org
The ElGamal cryptosystem is an asymmetric cryptosystem that works on abelian groups of
integers. This study examines the improvement of the discrete logarithm of the matrix in the …

Dynamic memory risk identification model and simulation based on immune algorithm extension

B Yang, Y Chen - Journal of Intelligent & Fuzzy Systems, 2018 - content.iospress.com
Taking the dynamic risk identification as the research object, propose a risk identification
model of dynamic memory and variable fuzzy identify based on the immune mechanism …

E-business information fuzzy retrieval system based on block chain anti-attack algorithm

F Gao, MA Basu - Journal of Intelligent & Fuzzy Systems, 2018 - content.iospress.com
The current e-business information retrieval system ignores the threat of distributed denial of
service attack from computer network, which results in low retrieval recall, accuracy, and …

[PDF][PDF] New public-key cryptosystem algorithm based on function composition of matrix

BDA Prayanti, B Adiwinoto - … .s3.ap-south-1.amazonaws.com
Experts argue that public key cryptography systems based on commutative groups (abelian
groups) are quite vulnerable to quantum algorithms attacks. For this reason, experts have …

[PDF][PDF] Modified public key cryptosystem based on distance and geometry area in triangles

BDA Prayanti - researchgate.net
Public key cryptosystems using commutative algebra are not safe from quantum algorithm
attacks. For this reason, experts have developed non-commutative algebra applied to …