• No results found

public key

Public-Key Cryptography: Theory and Practice - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

Public-Key Cryptography: Theory and Practice - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

... Beweisbare Sicherheit ist ein wichtiges Ziel beim Entwurf von Public-Key-Kryptosystemen. F¨ ur die meisten Sicherheitseigenschaften muss hierbei praktische Sicherheit gegen Angreifer mit beschr¨ ankten ...

117

Incremental  Deterministic  Public-Key  Encryption

Incremental Deterministic Public-Key Encryption

... Informally, a collection of smooth trapdoor functions consists of two families of functions. Func- tions in one family are injective and can be efficiently inverted using a trapdoor. Functions in the other family are ...

21

SHADOW  NUMBERS  PUBLIC  KEY  ENCRYPTION

SHADOW NUMBERS PUBLIC KEY ENCRYPTION

... present public key encryption in this paper involves the use of two values and they are the shadow’s values of a base value, and the base value is derived from the two shadows’ ...the public ...

11

Public-Key Cryptography Techniques Evaluation

Public-Key Cryptography Techniques Evaluation

... a public-key that may be known to anyone and is used to encrypt messages and verify signatures, and a private- key that is owned only by the recipient and is used to decrypt messages and create ...

12

Double  shielded  Public  Key  Cryptosystems

Double shielded Public Key Cryptosystems

... in Public Key Cryptography, 6th International Workshop on Practice and Theory in Public Key Cryptography, in: PKC 2003 ...Ko-Lee-Cheon-Han-Kang-Park key agreement scheme in ...

14

Public Key Infrastructure: A Survey

Public Key Infrastructure: A Survey

... the key holder to the holders public ...in public key cryptography have lead to build a public key infrastructure (PKI) in which the digital certificates present the heart of ...

8

Multipair Public Key Cryptosystem

Multipair Public Key Cryptosystem

... the key management problem, Whitfield Diffie and Martin Hellman bring in the concept of public-key cryptography ...is public. While varied, the two parts of the key pair are ...

6

On  a  new  fast  public  key  cryptosystem

On a new fast public key cryptosystem

... , Public key cryptography has imposed itself as the necessary and indispensable building block of every IT Security ...that public key cryptosystems based on number theory problems are not ...

14

Public-Key  Encryption  with  Lazy  Parties

Public-Key Encryption with Lazy Parties

... a key-agreement protocol to share a random string between them so that the shared string will be uniformly random if at least one of them chooses good one in the key-agreement ...sender’s public ...

18

Fully  Bideniable  Public-Key  Encryption

Fully Bideniable Public-Key Encryption

... both public and shared key setting, and sketched the idea of plan-ahead ...sender-deniable public-key scheme, as well as a bide- niable shared-key ...

18

Integer  Reconstruction  Public-Key  Encryption

Integer Reconstruction Public-Key Encryption

... A dangerous game, that we do not recommend, reduces noise in the visibility window. If A, B, G, F are generated in a biased way by shifting more Hamming weight into the MSBs and the LSBs as shown in Figure 5, then the ...

22

Cryptography: A Comparison of Public Key Systems

Cryptography: A Comparison of Public Key Systems

... secret key directly, they will need to know the prime factorization of n, which gives them p and ...the public key to generate the value of d (by solving the congruence: 𝑑𝑑𝑒𝑒 ≡ 1 𝑚𝑚𝑚𝑚𝑑𝑑 ((𝑝𝑝 − 1)(𝑝𝑝 ...

12

A  new  public  key  system  based  on  Polynomials  over  finite  fields  GF(2)

A new public key system based on Polynomials over finite fields GF(2)

... DH key exchange and in 1978 with another fundamental work by Rivest, Shamir and Adleman [2], called RSA ...DH key exchange is based on the discrete logarithm problem (DLP) and RSA is based on integer ...

5

A Review on Public Key Cryptography: Algorithms

A Review on Public Key Cryptography: Algorithms

... a public-key cryptosystem just like RSA and El ...a public and a private key. Public key is used for encryption/signature ...Private key is used for decryption/signature ...

7

A comparison between Public key authority and certification authority for distribution of public key

A comparison between Public key authority and certification authority for distribution of public key

... The key management of public key defines two aspects first one is the distribution of public key and the second one is the use of public key to distribute secret keys for ...

5

Disseminated Public-Key Management and Certificate Generation Scheme for MANET

Disseminated Public-Key Management and Certificate Generation Scheme for MANET

... false key-user binding by issuing false ...a key Kv to a user f instead of user ...the public key of user f, when it is really the public key of user ...false key K’v, ...

5

Data Security through Video Embedding

Data Security through Video Embedding

... Public key encryption is only safe and secure if the sender of an encrypted message can be sure that the public key used for encryption belongs to the intended ...a public key ...

6

The Security of Information in Financial Transactions via Mobile: Algorithms

The Security of Information in Financial Transactions via Mobile: Algorithms

... their public keys; a way to exchange public keys is using a reputable organiza- tion that is agreed by ...our public key for communication in the organization, and for communication receive ...

7

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

... effcient public- key ...decryption key. The problem is solved by the introduction of key aggregate ...In key aggregate cryptosystem user will encrypt message not merely in a ...

5

An  Efficient  Homomorphic  Encryption  Protocol   for  Multi-User  Systems

An Efficient Homomorphic Encryption Protocol for Multi-User Systems

... are public key based. The only advantage of the public key homomorphic encryption schemes is the possibility of encrypting data without needing to know the private key, ...private ...

19

Show all 10000 documents...

Related subjects