Results 1 to 10 of about 4,167 (184)

MODIFICATION OF POLLARD RHO ALGORITHM USING NEGATION MAPPING [PDF]

open access: yesBarekeng, 2022
El Gamal encryption was introduced in 1985 and is still commonly used today. Its hardness is based on a discrete logarithm problem defined over the finite abelian cyclic group group chosen in the original paper was but later it was proven that using the
Sa'aadah Sajjana Carita, Herman Kabetta
doaj   +3 more sources

Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography. [PDF]

open access: yesPLoS ONE
In an attribute-based strong designated verifier signature, a signer who satisfies the access structure signs the message and assigns it to a verifier who satisfies the access structure to verify it, which enables fine-grained access control for signers ...
Rui Ma, Linyue Du
doaj   +2 more sources

Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography

open access: yesCybernetics and Information Technologies, 2021
Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature
Abhishek Kunal   +1 more
doaj   +1 more source

Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement

open access: yesMathematics, 2022
The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks.
Fairuz Shohaimay, Eddie Shahril Ismail
doaj   +1 more source

Comparative Study of Digital Signature Standards Based on Discrete Logarithm [PDF]

open access: yesJisuanji gongcheng, 2016
As Chinese state encryption administration is seeking the next generation of Digital Signature Standard(DSS),this paper analyzes and compares seven DSS listed in ISO/IEC 14888-3 and SM2 which are based on Discrete Logarithm Problem(DLP) or Elliptic Curve
FENG Zeyu,GONG Boru,ZHAO Yunlei
doaj   +1 more source

Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography

open access: yesCybernetics and Information Technologies, 2021
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards.
Abhishek Kunal   +1 more
doaj   +1 more source

Radio Frequency Identification Mutual Authentication Protocol Based on Elliptic Curve Cryptography [PDF]

open access: yesJisuanji gongcheng, 2017
Aiming at wireless communication security problem of Radio Frequency Identification(RFID) the based on Elliptic Curve Cryptography(ECC) algorithm,this paper proposes a RFID mutual authentication protocol.It describes in detail the process of the new ...
LIU Boya,LIU Nianyi,YANG Yatao,LI Zichen
doaj   +1 more source

An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain

open access: yesIEEE Access, 2021
The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation in the process of signature and verification, which greatly reduces the efficiency of digital signatures.
Shuang-Gen Liu, Wan-Qi Chen, Jia-Lu Liu
doaj   +1 more source

Implications of the Arithmetic Ratio of Prime Numbers for RSA Security

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2023
The most commonly used public key cryptographic algorithms are based on the difficulty in solving mathematical problems such as the integer factorization problem (IFP), the discrete logarithm problem (DLP) and the elliptic curve discrete logarithm ...
Ivanov Andrey, Stoianov Nikolai
doaj   +1 more source

LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments

open access: yesAin Shams Engineering Journal, 2022
Fog computing uses near-user edge devices that are usually smart devices with very limited storage and computation resources; hence, the authentication process should be lightweight to be suitable for fog computing environment.
Mariam Hamada   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy