نتایج جستجو برای: private key cryptosystem

تعداد نتایج: 645641  

Journal: :CoRR 2004
Manoj Kumar

RSA Cryptosystem ElGamal Cryptosystem Messey Omura Cryptosystem Knapsack Cryptosystem Construction of Knapsack Cryptosystem Quadratic Residue Cryptosystem Hybrid Cryptosystem: Diffie Hellman’s key Exchange Digital Signatures A Classification of Digital Signature Schemes Digital Signature Schemes with Appendix Digital Signature Schemes with Message Recovery RSA Signature Scheme Feige– Fiat – Sha...

2002
Ari Juels Jorge Guajardo

We consider the problem of proving that a user has selected and correctly employed a truly random seed in the generation of her RSA key pair. This task is related to the problem of key validation, the process whereby a user proves to another party that her key pair has been generated securely. The aim of key validation is to pursuade the verifying party that the user has not intentionally weake...

2017
Girish Kumar

In cloud, there is an important functionality called Data sharing. Data sharing is also concerned about the security, efficiency and flexibility for the data to share in the cloud storage. The capacity of selectively sharing encrypted data with different users via public cloud server may great ease security concerned over inattentive data leaks in the cloud. The key challenging of designing enc...

2004
Byung kwan Lee Tai-Chi Lee Seung Hae Yang

Unlike SET (Secure Electronic Transaction) protocol. This paper proposes an ASEP (Advanced Secure Electronic Payment) protocol, which uses ECC (Elliptic Curve Cryptosystem with F2 m not Fp) [1, 2, 3], SHA (Secure Hash Algorithm) and 3BC (Block Byte Bit Cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC are...

1999
Jeff Hoffstein Daniel Lieman Jill Pipher Joseph H. Silverman

0. Introduction 1. Description of NTRU 1.1. Notation 1.2. Key Creation 1.3. Encryption 1.4. Decryption 1.5. Why Decryption Works 1.6. Parameter choices notation and a norm estimate 1.7. Sample spaces 1.8. A Decryption Criterion 2. Attributes and Advantages of NTRU 2.1. Theoretical Operating Speci cations 2.2. Comparison With Other PKCS's 3. Security Considerations 3.1. Security Analysis 3.2. Br...

Journal: :Int. Arab J. Inf. Technol. 2006
Sahadeo Padhye

The standard RSA cryptosystem is not semantically secure. Pointcheviel proposed a variant of RSA cryptosystem with the property of semantic security by introducing a new problem known as DRSA problem. He called it DRSA scheme. In this paper, we underlined a shortcoming of that scheme and proposed an alternative DRSA public key cryptosystem.

Journal: :CoRR 2008
An-Ping Li

In this paper,we will present a new key exchange system based on linear algebra, which spend less operations but weaker in security than the DiffieHellman’s one.

2011
Nadia M.G. Al-Saidi M. G. AL-Saidi Mahmood Ahmed

Problem statement: In the last decade, dynamical systems were utilized to develop cryptosystems, which ushered the era of continuous value cryptography that transformed the practical region from finite field to real numbers. Approach: Taking the security threats and privacy issues into consideration, fractals functions were incorporated into public-key cryptosystem due to their complicated math...

2011
Xu-Ren Luo Chen-Hui Jerry Lin

In recent years the study of cryptosystem has shifted noticeably from symmetric to asymmetric key encryptions. One of the more intriguing issues of the research is NTRU encryption system, which is based on ring theory. The security of NTRU always depends on the lattices. Several studies have suggested that it is very difficult to know whether a polynomial is invertible or not. Nayak et al. intr...

2003
Seong-Hun Paeng Bae Eun Jung Kil-Chan Ha

In Crypto 97, a public key cryptosystem based on the closest vector problem was suggested by Goldreich, Goldwasser and Halevi [4]. In this paper, we propose a public key cryptosystem applying representations of polynomials to the GGH encryption scheme. Its key size is much smaller than the GGH system so that it is a quite practical and efficient lattice based cryptosystem.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید