2009 IEEE/ACS International Conference on Computer Systems and Applications 2009
DOI: 10.1109/aiccsa.2009.5069354
|View full text |Cite
|
Sign up to set email alerts
|

Fast asymmetric cryptosystem based on Boolean product of matrices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Table 1 shows, that the mapping of the binary integers between 0 and 2 n-1 into Boolean functions values is not a bijective procedure. Also the Boolean permutation, formed by any k components of the public key, is hard to invert due to own largeness [3], so the cryptosystem cannot be easily broken. To provide this, Boolean permutation with low linearity has to be chosen [3].…”
Section: Algebraic Attackmentioning
confidence: 99%
“…Table 1 shows, that the mapping of the binary integers between 0 and 2 n-1 into Boolean functions values is not a bijective procedure. Also the Boolean permutation, formed by any k components of the public key, is hard to invert due to own largeness [3], so the cryptosystem cannot be easily broken. To provide this, Boolean permutation with low linearity has to be chosen [3].…”
Section: Algebraic Attackmentioning
confidence: 99%