{"id":"https://openalex.org/W3095259667","doi":"https://doi.org/10.1109/ict49546.2020.9239493","title":"SRVB cryptosystem: another attempt to revive Knapsack-based public-key encryption schemes","display_name":"SRVB cryptosystem: another attempt to revive Knapsack-based public-key encryption schemes","publication_year":2020,"publication_date":"2020-10-05","ids":{"openalex":"https://openalex.org/W3095259667","doi":"https://doi.org/10.1109/ict49546.2020.9239493","mag":"3095259667"},"language":"en","primary_location":{"id":"doi:10.1109/ict49546.2020.9239493","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict49546.2020.9239493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 27th International Conference on Telecommunications (ICT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033331486","display_name":"Yuri da Silva Villas Boas","orcid":null},"institutions":[{"id":"https://openalex.org/I4104125","display_name":"Universidade Federal de Santa Catarina","ror":"https://ror.org/041akq887","country_code":"BR","type":"education","lineage":["https://openalex.org/I4104125"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Yuri da Silva Villas Boas","raw_affiliation_strings":["Department of Informatics and Statistics, Federal University of Santa Catarina, Florian\u00f3polis, Brazil","Federal University of Santa Catarina,Department of Informatics and Statistics,Florianop\u00f3lis,Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Informatics and Statistics, Federal University of Santa Catarina, Florian\u00f3polis, Brazil","institution_ids":["https://openalex.org/I4104125"]},{"raw_affiliation_string":"Federal University of Santa Catarina,Department of Informatics and Statistics,Florianop\u00f3lis,Brazil","institution_ids":["https://openalex.org/I4104125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005515480","display_name":"Daniel Santana Rocha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daniel Santana Rocha","raw_affiliation_strings":["Institute for Pure and Applied Mathematics, Rio de Janeiro, Brazil","Institute for Pure and Applied Mathematics,Rio de Janeiro,Brazil"],"affiliations":[{"raw_affiliation_string":"Institute for Pure and Applied Mathematics, Rio de Janeiro, Brazil","institution_ids":[]},{"raw_affiliation_string":"Institute for Pure and Applied Mathematics,Rio de Janeiro,Brazil","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033453873","display_name":"Charles E de Barros","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130985","display_name":"Federal University of S\u00e3o Jo\u00e3o del-Rei","ror":null,"country_code":"BR","type":null,"lineage":["https://openalex.org/I4210130985"]},{"id":"https://openalex.org/I166595947","display_name":"Federal University of S\u00e3o Jo\u00e3o del-Rei","ror":"https://ror.org/03vrj4p82","country_code":"BR","type":"education","lineage":["https://openalex.org/I166595947"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Charles E de Barros","raw_affiliation_strings":["Department of Computer Science, Federal University of S\u00e3o Jo\u00e3o, del-Rey, S\u00e3o Jo\u00e3o del-Rey, Brazil","Federal University of S\u00e3o Jo\u00e3o,Department of Computer Science,del-Rey,S\u00e3o Jo\u00e3o del-Rey,Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Federal University of S\u00e3o Jo\u00e3o, del-Rey, S\u00e3o Jo\u00e3o del-Rey, Brazil","institution_ids":["https://openalex.org/I4210130985"]},{"raw_affiliation_string":"Federal University of S\u00e3o Jo\u00e3o,Department of Computer Science,del-Rey,S\u00e3o Jo\u00e3o del-Rey,Brazil","institution_ids":["https://openalex.org/I166595947"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054834050","display_name":"Jean Everson Martina","orcid":"https://orcid.org/0000-0003-4104-1741"},"institutions":[{"id":"https://openalex.org/I4104125","display_name":"Universidade Federal de Santa Catarina","ror":"https://ror.org/041akq887","country_code":"BR","type":"education","lineage":["https://openalex.org/I4104125"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Jean Everson Martina","raw_affiliation_strings":["Department of Informatics and Statistics, Federal University of Santa Catarina, Florian\u00f3polis, Brazil","Federal University of Santa Catarina,Department of Informatics and Statistics,Florianop\u00f3lis,Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Informatics and Statistics, Federal University of Santa Catarina, Florian\u00f3polis, Brazil","institution_ids":["https://openalex.org/I4104125"]},{"raw_affiliation_string":"Federal University of Santa Catarina,Department of Informatics and Statistics,Florianop\u00f3lis,Brazil","institution_ids":["https://openalex.org/I4104125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033331486"],"corresponding_institution_ids":["https://openalex.org/I4104125"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63990341,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/knapsack-problem","display_name":"Knapsack problem","score":0.9686382412910461},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7785120010375977},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6476399898529053},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6317427158355713},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5510396361351013},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5468430519104004},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based cryptography","score":0.4864330291748047},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47808265686035156},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.431357741355896},{"id":"https://openalex.org/keywords/strong-cryptography","display_name":"Strong cryptography","score":0.42008188366889954},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40591850876808167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3748742938041687},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1956140398979187}],"concepts":[{"id":"https://openalex.org/C113138325","wikidata":"https://www.wikidata.org/wiki/Q864457","display_name":"Knapsack problem","level":2,"score":0.9686382412910461},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7785120010375977},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6476399898529053},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6317427158355713},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5510396361351013},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5468430519104004},{"id":"https://openalex.org/C137660015","wikidata":"https://www.wikidata.org/wiki/Q6497083","display_name":"Lattice-based cryptography","level":5,"score":0.4864330291748047},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47808265686035156},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.431357741355896},{"id":"https://openalex.org/C165922616","wikidata":"https://www.wikidata.org/wiki/Q4241181","display_name":"Strong cryptography","level":3,"score":0.42008188366889954},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40591850876808167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3748742938041687},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1956140398979187},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ict49546.2020.9239493","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict49546.2020.9239493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 27th International Conference on Telecommunications (ICT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1920504236","https://openalex.org/W1979821270","https://openalex.org/W1999648784","https://openalex.org/W2106287110","https://openalex.org/W2114616381","https://openalex.org/W2150780437","https://openalex.org/W2156186849","https://openalex.org/W2628194637","https://openalex.org/W3144959161","https://openalex.org/W4205426033","https://openalex.org/W6601724469"],"related_works":["https://openalex.org/W1528334372","https://openalex.org/W1515856307","https://openalex.org/W1979729322","https://openalex.org/W1999768565","https://openalex.org/W4385711271","https://openalex.org/W2032226069","https://openalex.org/W2103481631","https://openalex.org/W2112086648","https://openalex.org/W2411772867","https://openalex.org/W1990210417"],"abstract_inverted_index":{"Public-key":[0],"cryptography":[1],"is":[2,137],"a":[3,69,134,139],"ubiquitous":[4],"buildingblock":[5],"of":[6,23,54,57,95,114],"modern":[7],"telecommunication":[8],"technology.":[9],"Among":[10],"the":[11,15,20,52,85,91,97,102,112,126,132],"most":[12,92],"historically":[13],"important,":[14],"knapsack-based":[16,58,78],"encryption":[17,60],"schemes,":[18],"from":[19],"early":[21],"years":[22],"public-key":[24],"cryptography,":[25],"performed":[26],"particularly":[27],"well":[28],"in":[29],"computational":[30],"resources":[31],"(time":[32],"and":[33,35,37,101],"memory),":[34],"mathematical":[36],"algorithmic":[38],"simplicity.":[39],"Although":[40],"effective":[41],"cryptanalyses":[42],"readily":[43],"curtailed":[44],"their":[45],"widespread":[46],"adoption":[47],"to":[48,67,120],"several":[49],"different":[50],"attempts,":[51],"possibility":[53],"actual":[55],"usage":[56],"asymmetric":[59],"schemes":[61,123],"remains":[62],"unsettled.":[63],"This":[64],"paper":[65],"aims":[66],"present":[68,131],"novel":[70],"construction":[71],"that":[72,89,136],"offers":[73],"consistent":[74],"security":[75],"improvements":[76,83],"on":[77],"cryptography.":[79],"We":[80],"propose":[81],"two":[82],"upon":[84],"original":[86],"knapsack":[87,122],"cryptosystem":[88],"address":[90],"important":[93],"types":[94,113],"attacks:":[96],"Diophantine":[98],"approximationsbased":[99],"attacks":[100,115],"lattice":[103],"problems":[104],"oracle":[105],"attacks.":[106],"The":[107],"proposed":[108,144],"defences":[109],"demonstrably":[110],"preclude":[111],"mentioned":[116],"above,":[117],"thus":[118],"contributing":[119],"revive":[121],"or":[124],"settle":[125],"matter":[127],"negatively.":[128],"Finally,":[129],"we":[130],"http://t3infosecurity.com/nepsecNep.Sec,":[133],"contest":[135],"offering":[138],"prize":[140],"for":[141],"breaking":[142],"our":[143],"cryptosystem.":[145]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
