Results 211 to 220 of about 11,187 (236)
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT. [PDF]
Park K, Kim M, Park Y.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Hypergroupoids and cryptosystems
Journal of Discrete Mathematical Sciences and Cryptography, 2002Abstract The GW-hypergroupoids are defined as generalization of the Wall hypergroupoids. The authors introduce a system to obtain a ciphertext using a GW-hypergroupoid. Conditions are given on the GW-hypergroupoid to univocally decipher a given ciphertext and to protect the original message and the key.
MIGLIORATO, Renato, GENTILE, GIUSEPPE
openaire +3 more sources
Paillier's cryptosystem revisited
Proceedings of the 8th ACM conference on Computer and Communications Security, 2001We re-examine Paillier's cryptosystem, and show that by choosing a particular discrete log base g, and by introducing an alternative decryption procedure, we can extend the scheme to allow an arbitrary exponent e instead of N. The use of low exponents substantially increases the efficiency of the scheme.
CATALANO, Dario+3 more
openaire +3 more sources
Elliptic Curve Cryptosystems [PDF]
This paper deals with an implementation of Elliptic Curve Cryptosystem. Cryptography (or cryptology) from Greek word kryptos, "hidden, secret"; and graph, "writing" is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryp- tography include ATM
Dr.K.V.Durgaprasad Dr.K.V.Durgaprasad+1 more
openaire +1 more source
Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication
2008 IFIP International Conference on Network and Parallel Computing, 2008The recent growth of multimedia group of applications is driving the need for secure multicast communication. Secure multicast communication in dynamic environments like wireless networks and grids are potentially of critical concern. As multicast group members move in and out of the group, in order to preserve confidentiality, it becomes imperative to
V.R. Uthariaraj, A.J. Prakash
openaire +2 more sources
The commonest application of number theory, and perhaps the most ubiquitous application of any kind of advanced mathematics, is the RSA cryptosystem. In this chapter we describe the system and how it works, based on a few key ideas from previous chapters.
openaire +1 more source
Hybrid inter-organization cryptosystem using ElGamal cryptosystem
2015 IEEE International Conference on Consumer Electronics - Taiwan, 2015Conventional cryptosystems are supposed to be used for the personal communication. However, the secure and effective communication system is more and more required for inter-organization cryptosystem. In this paper, we define the framework of the hybrid-type inter-organization cryptosystem and we propose a hybrid-type inter-organization cryptosystem ...
Yasuyuki Murakami, Masao Kasahara
openaire +2 more sources
1997
An abstraction and some desirable properties of the PHT layer as defined in SAFER are identified. These properties lead to the construction of 3071 other structures which could be used as alternative PHT layers. Results of preliminary investigations carried out on these structures to ascertain their suitability as alternatives are briefly discussed ...
Alko Meijer, Karl Brincat
openaire +2 more sources
An abstraction and some desirable properties of the PHT layer as defined in SAFER are identified. These properties lead to the construction of 3071 other structures which could be used as alternative PHT layers. Results of preliminary investigations carried out on these structures to ascertain their suitability as alternatives are briefly discussed ...
Alko Meijer, Karl Brincat
openaire +2 more sources
An implementation of inter-organization cryptosystem based on RSA cryptosystem
2015 IEEE International Conference on Consumer Electronics - Taiwan, 2015Conventional cryptosystems are supposed to be used for the personal communication. However, the secure and effective communication system is more and more required for inter-organization cryptosystem. In this paper, we redefine the inter-organization cryptosystem using the public-key cryptosystem.
Tatsuki Miyamoto, Yasuyuki Murakami
openaire +2 more sources