Results 21 to 30 of about 6,586,318 (243)

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

open access: yesIEEE Access, 2019
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee   +3 more
doaj   +1 more source

3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based

open access: yesIEEE Access, 2020
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj   +1 more source

Public Key Cipher with Signature Based on Diffie-Hellman and the Magic Square Problem [PDF]

open access: yesEngineering and Technology Journal, 2016
In the present paper, wedeveloped a new variant of asymmetric cipher (Public Key) algorithm based on the Discrete Logarithm Problem (DLP) uses Diffie-Hellman key exchange protocol and the mathematical features of magic square.
Abdul S.Rahma   +2 more
doaj   +1 more source

Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment

open access: yesIEEE Access, 2020
With the public key being the parameter users are mostly addressed by on blockchain network, an intruder can connect transactional patterns to the public key and make a probable revelation of the identity of the user.
Bonnah Ernest, Ju Shiguang
doaj   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Matrično zasnovan algoritam za skrivanje tekstova i obradu informacija

open access: yesVojnotehnički Glasnik, 2014
Primena diferencijalne geometrije u skrivanju tekstualnih podataka prikazana je u ovom radu. Ta primena predstavlja generalizaciju prethodno predstavljenih metoda. Matrično vrednosne funkcije više promenljivih korišćene su u ovom radu.
Nenad O. Vesić, Dušan J. Simjanović
doaj   +1 more source

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

Radio Frequency Public Key Generator for Digital Cryptographic Application

open access: yesIEEE Access, 2023
In Internet of Things (IoT) environments, effective public key management is crucial for managing numerous devices. RF features, primarily considered analog features within physical layer authentication by RF Fingerprinting (RFF) processes, present a ...
Jusung Kang, Young-Sik Kim, Heung-No Lee
doaj   +1 more source

Key-Insulated Public Key Cryptosystems [PDF]

open access: yes, 2002
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by ...
Yevgeniy Dodis   +3 more
openaire   +1 more source

A hybrid cryptosystem for cloud security: combining Okamoto-Uchiyama and Advanced Encryption Standard for optimized encryption performance [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة
The central challenge in cloud computing is delivering strong data protection while maintaining high system performance. This paper addresses the problem by developing a hybrid cryptosystem that integrates the strengths of Okamoto-Uchiyama (OU) and ...
Azhar Malik
doaj   +1 more source

Home - About - Disclaimer - Privacy