MODIFICATION OF POLLARD RHO ALGORITHM USING NEGATION MAPPING [PDF]
El Gamal encryption was introduced in 1985 and is still commonly used today. Its hardness is based on a discrete logarithm problem defined over the finite abelian cyclic group group chosen in the original paper was but later it was proven that using the
Sa'aadah Sajjana Carita, Herman Kabetta
doaj +3 more sources
Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography. [PDF]
In an attribute-based strong designated verifier signature, a signer who satisfies the access structure signs the message and assigns it to a verifier who satisfies the access structure to verify it, which enables fine-grained access control for signers ...
Rui Ma, Linyue Du
doaj +2 more sources
Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature
Abhishek Kunal +1 more
doaj +1 more source
The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks.
Fairuz Shohaimay, Eddie Shahril Ismail
doaj +1 more source
Comparative Study of Digital Signature Standards Based on Discrete Logarithm [PDF]
As Chinese state encryption administration is seeking the next generation of Digital Signature Standard(DSS),this paper analyzes and compares seven DSS listed in ISO/IEC 14888-3 and SM2 which are based on Discrete Logarithm Problem(DLP) or Elliptic Curve
FENG Zeyu,GONG Boru,ZHAO Yunlei
doaj +1 more source
Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards.
Abhishek Kunal +1 more
doaj +1 more source
Radio Frequency Identification Mutual Authentication Protocol Based on Elliptic Curve Cryptography [PDF]
Aiming at wireless communication security problem of Radio Frequency Identification(RFID) the based on Elliptic Curve Cryptography(ECC) algorithm,this paper proposes a RFID mutual authentication protocol.It describes in detail the process of the new ...
LIU Boya,LIU Nianyi,YANG Yatao,LI Zichen
doaj +1 more source
An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain
The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation in the process of signature and verification, which greatly reduces the efficiency of digital signatures.
Shuang-Gen Liu, Wan-Qi Chen, Jia-Lu Liu
doaj +1 more source
Implications of the Arithmetic Ratio of Prime Numbers for RSA Security
The most commonly used public key cryptographic algorithms are based on the difficulty in solving mathematical problems such as the integer factorization problem (IFP), the discrete logarithm problem (DLP) and the elliptic curve discrete logarithm ...
Ivanov Andrey, Stoianov Nikolai
doaj +1 more source
LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments
Fog computing uses near-user edge devices that are usually smart devices with very limited storage and computation resources; hence, the authentication process should be lightweight to be suitable for fog computing environment.
Mariam Hamada +2 more
doaj +1 more source

