The Rabin cryptosystem is an asymmetric cryptographic algorithm. Its security is based on the problem of integer factorization. Rabin cryptosystem has the advantage that the problem on which its security depends is proved to be as hard as... more
Received Dec 12, 2014 Revised Jan 20, 2015 Accepted Feb 26, 2015 The Rabin cryptosystem is an asymmetric cryptographic algorithm. Its security is based on the problem of integer factorization [4]. Rabin cryptosystem has the advantage that... more
We developed a system to investigate resonant nonlinear optical interactions in acetylene molecules, confined in a hollow-core photonic crystal fiber (HC-PCF), using light injection through a low-loss splice from one end of the fiber,... more
Secure and efficient data storage is needed in the cloud environment in modern era of information technology industry. In the present scenario the cloud verifies the authenticity of the cloud services without the knowledge of user's... more
Secure and efficient data storage is needed in the cloud environment in modern era of information technology industry. In the present scenario the cloud verifies the authenticity of the cloud services without the knowledge of user's... more
We define semi-commutative invertible masking structures which aim to capture the methodology of exponentiation-only protocol design (such as discrete logarithm and isogeny-based cryptography). We discuss two instantiations: the first is... more
In this work we first define semi-commutative (invertible) masking structures which present a simple abstraction to capture the various examples of protocol design that are based on exponentiation-only style operations (such as discrete... more
This is a brief introduction to the D2-KFAB Theory, which stands for ‘Koopman Feynman-Kac AdS/CFT Boltzmann D2-Brane on KAM Tori DBI Action’. The D2-KFAB is a math, physics, and AI-machine learning unified theoretical framework. The... more
In this fast transforming world finance and money is also transforming on a high note.Digitalized strength and other innovative systems and instruments are creating new platforms for financial traction who rectify and assume your... more
The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of algorithm which comprise of encryption and decryption. The... more
In this fast transforming world finance and money is also transforming on a high note.Digitalized strength and other innovative systems and instruments are creating new platforms for financial traction who rectify and assume your... more
The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of algorithm which comprise of encryption and decryption. The... more
In this fast transforming world finance and money is also transforming on a high note.Digitalized strength and other innovative systems and instruments are creating new platforms for financial traction who rectify and assume your... more
In this paper, we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves. The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $, is a straightforward... more
Information security and privacy in healthcare IT have been a longstanding challenge in recent years. Technologies like data mining, private database, Role based access control, encryption etc. attain the goal at some extent but don’t... more
Cloud Computing is a way to enhance the facility or add capabilities with liveliness without investing in new infrastructure, training new human resources, or licensing latest software. It extends Information Technology’s (IT) existing... more
We analyse the role of degree of entanglement for Vaidman's game in a setting where the players share a set of partially entangled three-qubit states. Our results show that the entangled states combined with quantum strategies may not be... more
We developed a system to investigate resonant nonlinear optical interactions in acetylene molecules, confined in a hollow-core photonic crystal fiber (HC-PCF), using light injection through a low-loss splice from one end of the fiber,... more
We developed a system to investigate resonant nonlinear optical interactions in acetylene molecules, confined in a hollow-core photonic crystal fiber (HC-PCF), using light injection through a low-loss splice from one end of the fiber,... more
In this paper we analyze the (im)possibility of the exact distinguishability of orthogonal multipartite entangled states under restricted local operation and classical communication. Based on this local distinguishability analysis we... more
The main purpose of the presented paper is to establish a secure way by integrating the biological characteristic as a key with cryptographic applications. A binary string is generated reliably from genuine fingerprint conventions. That... more
Article history: Received: 25/01/2020 Revised: 31 / 01/2020 Accepted: 01/02/2020 Privacy and data security is one of the most important aspects that need to be addressed, especially in this digital age where all desktop and mobile... more
The 5-qubit quantum computer prototypes that IBM has given open access to on the cloud allow the implementation of real experiments on a quantum processor. We present the results obtained in five experimental tests performed on these... more
The use of electronic medical record (EMR) system is gaining attention in the healthcare sectors around the world, and its acceptability threatened by the security of patients’ information. Hence, the need to carry out study on efficient... more
Cryptography is the practise and study of techniques for secure communication in the presence of third parties. The necessity and the fact that exchanged messages are exposed to other people during the transmission promoted the creation... more
I hereby declare that this research monograph becomes the property of Md. Shamim Hossain Biswas and to be placed at the worldwide database access library for future cryptographic researchers and also be available Online. Md. Shamim... more
The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of algorithm which comprise of encryption and decryption. The... more
We developed a system to investigate resonant nonlinear optical interactions in acetylene molecules, confined in a hollow-core photonic crystal fiber (HC-PCF), using light injection through a low-loss splice from one end of the fiber,... more
RSA [1] is one of the mostly used cryptosystem in securing data and information. Though, it has been recently discovered that RSA has some weaknesses and in advance technology, RSA is believed to be inefficient especially when it comes to... more
In this paper, we develop a quantum key distribution protocol based on the Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among the users in blocks through two steps. In this protocol, for three-particle GHZs three... more
We propose a new quantum protocol to teleport an arbitrary unknown Nqubit entangled state from a sender to a fixed receiver under the control of M (M < N) controllers. In comparison with other existing protocols, ours is more economical... more
The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of algorithm which comprise of encryption and decryption. The... more
M.S.H. Biswas crypto-intensive techniques in combination of Encryption algorithm, Signature generation algorithm, Signature verification algorithm and Decription algorithm. Michael O. Rabin Signature scheme uses random padding to validate... more
We demonstrate the possibility of controlling the success probability of a secret sharing protocol using a quantum cloning circuit. The cloning circuit is used to clone the qubits containing the encoded information and en route to the... more
Michael O. Rabin Cryptosystem can generate same ciphertext form different plaintext as well as multiple plaintext from single cyphertext. There are a number of techniues to reveal original plaintext. But none of them can seperate same... more
Cryptography is the practise and study of techniques for secure communication in the presence of third parties. The necessity and the fact that exchanged messages are exposed to other people during the transmission promoted the creation... more
Abstract A detailed analysis has showed that the quantum secret sharing protocol based on the Grover algorithm (Phys Rev A, 2003, 68: 022306) is insecure. A dishonest receiver may obtain the full information without being detected. A... more
In this slides I have tried to define secret sharing mathematically and discussed the classical secret sharing scheme named (k,n) threshold scheme given by Adi Shamir (Commun. ACM 22, 612) in 1979 and in continuation the QSS scheme was... more
We discuss (im)possibility of the exact cloning of orthogonal but genuinely entangled three qubit states aided with entangled ancila under local operation and classical communication. Whereas any two orthogonal GHZ states taken from the... more
We introduce a problem of distinguishing between two quantum states as a new underlying problem to build a computational cryptographic scheme that is ”secure” against quantum adversary. Our problem is a natural generalization of the... more