Results 31 to 40 of about 1,761 (191)

Improvement of FPPR method to solve ECDLP

open access: yesPacific Journal of Mathematics for Industry, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Huang, Yun-Ju   +3 more
openaire   +1 more source

LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments

open access: yesAin Shams Engineering Journal, 2022
Fog computing uses near-user edge devices that are usually smart devices with very limited storage and computation resources; hence, the authentication process should be lightweight to be suitable for fog computing environment.
Mariam Hamada   +2 more
doaj   +1 more source

Efficient and Provably Secure Certificateless Signature Schemes [PDF]

open access: yesJisuanji gongcheng, 2016
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj   +1 more source

Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement

open access: yesMathematics, 2022
The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks.
Fairuz Shohaimay, Eddie Shahril Ismail
doaj   +1 more source

Realization of coprocessor which supports counting of discrete logarithm on elliptic curves with partial knowledge [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2017
In this paper we analyse realization of a coprocessor which supports counting of discrete logarithm on elliptic curves over the field FG(p), where p is the large prime, in FPGA. Main idea of the realization is based on using modules which are able to add
Michał Kędzierski   +2 more
doaj   +1 more source

Solving 114-Bit ECDLP for a Barreto-Naehrig Curve [PDF]

open access: yes, 2018
The security of cryptographic protocols which are based on elliptic curve cryptography relies on the intractability of elliptic curve discrete logarithm problem (ECDLP). In this paper, the authors describe techniques applied to solve 114-bit ECDLP in Barreto-Naehrig (BN) curve defined over the odd characteristic field.
Takuya Kusaka   +7 more
openaire   +1 more source

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

Isolated elliptic curves and the MOV attack

open access: yesJournal of Mathematical Cryptology, 2017
We present a variation on the CM method that produces elliptic curves over prime fields with nearly prime order that do not admit many efficiently computable isogenies. Assuming the Bateman–Horn conjecture, we prove that elliptic curves produced this way
Scholl Travis
doaj   +1 more source

Implications of the Arithmetic Ratio of Prime Numbers for RSA Security

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2023
The most commonly used public key cryptographic algorithms are based on the difficulty in solving mathematical problems such as the integer factorization problem (IFP), the discrete logarithm problem (DLP) and the elliptic curve discrete logarithm ...
Ivanov Andrey, Stoianov Nikolai
doaj   +1 more source

Pairing-free certificateless blind signature scheme for smart grid

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
The smart grid is an emerging power system that can realize the information exchange between users and power companies in two-way communication and adjust power companies’ power supply according to the real-time power requests from smart meters on the ...
ShuangGen Liu, Yu Zhu, RuiYun Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy