• No results found

Operation flow of Elliptic Curve based cryptosystem

An Efficient Encryption Schemes based on Hyper-Elliptic Curve Cryptosystem

An Efficient Encryption Schemes based on Hyper-Elliptic Curve Cryptosystem

... Abstract— Encryption requires a better approach in terms of security and size. The main research concern of encryption in public key cryptography is Hyper-Elliptic Curve Cryptography. HECC uses less number ...

5

An  efficient  semantically  secure  elliptic  curve  cryptosystem  based  on  KMOV

An efficient semantically secure elliptic curve cryptosystem based on KMOV

... secure elliptic curve cryp- tosystem based on ...such elliptic curve cryptosystem in the literature enjoying both ...IND-CPA elliptic curve schemes based on ...

9

A  Novel  RFID  Authentication  Protocol  based  on  Elliptic  Curve  Cryptosystem

A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem

... key based and asymmetric key based. The symmetric key based systems usually have some weaknesses such as suffering brute force, de-synchronization, impersonation, and tracing ...key based ...

21

An Enhanced Elliptic Curve Cryptosystem for Securing Data

An Enhanced Elliptic Curve Cryptosystem for Securing Data

... the Elliptic Curve. Elliptic Curve cryptosystem (ECC) is a technique of public-key encryption, which is rooted on the arithmetical construction of elliptic curves over finite ...

7

Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

... The Elliptic Curve Cryptosystem shortly called as (ECC) is one of the asymmetric key cryptosystems, which provides a high security for wireless applications compared to other asymmetric key ...

7

A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem

A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem

... the Elliptic Curve Method for factorization ECM, then one can break the RSA ...Demytko’s elliptic curve cryptosystem. Our method is based on Coppersmith’s technique for solving ...

17

A  Hardware  Analysis  of  Twisted  Edwards  Curves  for  an  Elliptic  Curve  Cryptosystem

A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem

... The average power (P wr) dissipation of the processor was measured at a fre- quency of 10 MHz. The current being drawn by the FPGA on its V CCIN T and V CCAU X line was measured. The voltage supplied to each line by the ...

14

An Hyper-Elliptic Curve Cryptosystem Scheme Using 3bc Algorithm

An Hyper-Elliptic Curve Cryptosystem Scheme Using 3bc Algorithm

... Figure: The bit-wise XOR on rows with session keys Note that the process of byte-exchange hides the meaning of 56 byte data, and the exchange of the data block number hides the order of data block, which needs to be ...

7

A New Efficient Key Agreement Scheme for VSAT Satellite Communications Based on Elliptic Curve Cryptosystem

A New Efficient Key Agreement Scheme for VSAT Satellite Communications Based on Elliptic Curve Cryptosystem

... transmission based on telecom- ...scheme based on key agreement scheme with mutual authentication to solve the security problems on the VSAT satellite ...is based on the RSA ...costs. Based on ...

8

A NEW EFFICIENT KEY AGREEMENT SCHEME FOR VSAT SATELLITE COMMUNICATIONS BASED ON ELLIPTIC CURVE CRYPTOSYSTEM

A NEW EFFICIENT KEY AGREEMENT SCHEME FOR VSAT SATELLITE COMMUNICATIONS BASED ON ELLIPTIC CURVE CRYPTOSYSTEM

... transmission based on telecom- ...scheme based on key agreement scheme with mutual authentication to solve the security problems on the VSAT satellite ...is based on the RSA ...costs. Based on ...

8

Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem

Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem

... with Elliptic Curve Cryptography to provide better security and proper security ...text based cryptography by generating base points on Elliptic curve over the finite ...on curve ...

7

An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem

An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem

... In this paper, we briefly review Arshad et al.’s scheme. We demonstrate Arshad et al.’s scheme fails to protect against off-line password guessing attack. Additionally, we show that in case the adversary succeeded in ...

8

Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem

Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem

... This means that representing a 160-bits integer requires, on average, 80 powers of 2 but only 64 Fibonacci numbers ( 230 × 0.2764). 1) Point Scalar Multiplication: Using the NewADD function described in Section II-C.1 we ...

11

A  Novel  Non-interactive  Deniable  Authentication  Protocol  with  Designated  Verifier  on  elliptic  curve  cryptosystem

A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem

... 22] are signature-based and [9, 10, 24, 25, 26] are shared-secrecy based (Although this might not be consistent with the titles mentioned in the original papers.). In these schemes, a message with its proof ...

18

A  Public  Key  Cryptosystem  Based  on  Singular  Cubic  Curve

A Public Key Cryptosystem Based on Singular Cubic Curve

... Also, in the Koyama scheme, the message dependent variable a gives some information about the plaintext but, in the proposed scheme we keep it secret which is known by the authorized receiver only. Without knowing the ...

9

Signcryption schemes based on elliptic curve cryptography

Signcryption schemes based on elliptic curve cryptography

... ID-Based cryptosystem; users communicate securely without distributing public key certificate, without storing public key directory, and without online participation of a ...identity based ...

52

Cryptographic Schemes based on Elliptic Curve Pairings

Cryptographic Schemes based on Elliptic Curve Pairings

... As we have seen in Section 4.5.2, we can further strengthen security against a ma- licious KGC in our schemes by allowing entities to choose identifiers, which bind together their public keys and identities. Now the ...

278

Elliptic Curve Based Cloud Storage Security

Elliptic Curve Based Cloud Storage Security

... Elliptical Curve Cryptography for end-to-end data security ...Identity based cryptography as it will reduce complex key management and certificate management ...stress. Elliptic curve discrete ...

6

An Elliptic Curve based Signcryption Protocol using Java

An Elliptic Curve based Signcryption Protocol using Java

... 3. PROPOSED SCHEME The purposed new scheme was based on elliptic curve cryptosystem and implemented in java. Here each user should get the certification of his public key from the certificate ...

6

Efficient Computation For Hyper Elliptic Curve Based Cryptography

Efficient Computation For Hyper Elliptic Curve Based Cryptography

... hyper elliptic curves over the fields of odd ...hyper elliptic curve of any genus over any ...hyper elliptic curves of any ...hyper elliptic curve over the field ...

134

Show all 10000 documents...

Related subjects