نتایج جستجو برای: public key cryptography
تعداد نتایج: 917476 فیلتر نتایج به سال:
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996). The message that is sent by the sender is called the plain...
This paper introduces the concept of certificateless public key cryptography (CL-PKC).In contrast to traditional public key cryptographic systems, CL-PKC does not require theuse of certificates to guarantee the authenticity of public keys. It does rely on the useof a trusted third party (TTP) who is in possession of a master key. In these respects,CL-PKC is similar to identity-b...
Odd-char multivariate hidden field equations, 2008.
2 RSA 4 2.1 The RSA system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.2 Establishing secret communication using the RSA system . . . . . . . . . . . . . 4 2.3 Security of RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.4 A very small example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.5 Factoring Record...
This paper describes am-ary exponentiation algorithm where the radix-m digits of an exponent can be treated in a somewhat random order without using any more group operations than a standard rightto-left m-ary exponentiation. This paper demonstrates that the random order countermeasure, commonly used to protect implementations of secret key cryptographic algorithms, can be applied to public key...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید