• No results found

public key based systems

Towards  a  Smart  Contract-based,  Decentralized,  Public-Key  Infrastructure

Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure

... distributed systems, they have the potential to offer a num- ber of desirable properties that CPKIs cannot offer, such as scalability, fault-tolerance, load balancing and ...DPKIs based on various distributed ...

33

E-Tendering With Public Key Infrastructure – A Survey Based Implementation

E-Tendering With Public Key Infrastructure – A Survey Based Implementation

... web based computer ...web based computer ...e-Tendering, Public Key Infrastructure is implemented for the robust ...web based environment guarantees the reliability of the overall ...

6

Key factors and underlying mechanisms for the enterprise systems lifecycle in public service organisations

Key factors and underlying mechanisms for the enterprise systems lifecycle in public service organisations

... generated based on the content and results of various tests. Based on these results, blood and blood product may be immediately classified for their intended ...Management Systems (LIMS) in the ...

323

A  new  public  key  system  based  on  Polynomials  over  finite  fields  GF(2)

A new public key system based on Polynomials over finite fields GF(2)

... DH key exchange and in 1978 with another fundamental work by Rivest, Shamir and Adleman [2], called RSA ...DH key exchange is based on the discrete logarithm problem (DLP) and RSA is based on ...

5

A  Polynomial-Time  Key-Recovery  Attack  on  MQQ  Cryptosystems

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems

... MQQ public key cryptosystems using multivari- ate quadratic quasigroups ...time key-recovery attack. Our key-recovery attack finds an equivalent key using the idea of so-called good ...

19

Novel methods for enabling public key schemes in future mobile systems

Novel methods for enabling public key schemes in future mobile systems

... enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end ...hardware based on the location of the ...card, ...

5

A  SAT-based  Public  Key  Cryptography  Scheme

A SAT-based Public Key Cryptography Scheme

... cryptography based on NP-hard prob- lems is dubbed ...crypto-system based on the Boolean Satisfiability Problem ...the systems mentioned ...secret key rather than a trap ...

11

The performance analysis of public key cryptography-based authentication

The performance analysis of public key cryptography-based authentication

... approaches have been proposed to analyze the per- formance of a security protocol. The first one is to implement under study protocols and then take their measurements in real systems (for example, see Amir et al. ...

15

Public-Key Cryptography: Theory and Practice - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

Public-Key Cryptography: Theory and Practice - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

... Various side-channel attack countermeasures for elliptic curve point multiplication have been proposed in the literature. The contributions of the present chapter are two different methods that use a uniform pattern of ...

117

Survey Report on Chaos Based Public-key Cryptosystem

Survey Report on Chaos Based Public-key Cryptosystem

... linear systems (especially partial differential ...Studied systems include populations, chemical reactions, convection, fluid flow and biological ...

7

Pseudo Random Generator Based Public Key Cryptography

Pseudo Random Generator Based Public Key Cryptography

... cryptographic systems have been ...communication systems is ...a key stream generator based on LFSR can be strengthened by using the properties of a physical ...LFSR based cryptography ...

5

Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems

Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems

... mechanism based on SSL, we need to utilize some sort of PKI, which is not nec- essarily part of the beyond-3G (B3G) network core [16] (Figure ...introduce public key ...

14

Hybrid Private Key-based Cryptosystem  for Cloud Storage Systems

Hybrid Private Key-based Cryptosystem for Cloud Storage Systems

... secret key corresponding to a public key or an identity in a normal asymmetric ...particular key. The key is usually stored inside either a personal computer or a trusted server, and ...

8

Estimating  Key  Sizes  For  High  Dimensional  Lattice-Based  Systems

Estimating Key Sizes For High Dimensional Lattice-Based Systems

... cryptographic systems is a major problem. Such systems are be- coming increasingly of interest since, to the best of our knowledge, they offer resistance to attacks that arise from the future development of ...

11

Cryptography: A Comparison of Public Key Systems

Cryptography: A Comparison of Public Key Systems

... curve based cryptography has one very important feature that appeals to the manufacturers of security protected electronic equipment – quicker calculations compared to the other major cryptographic ...

12

On  the  Leakage  Resilience  of  Ring-LWE  Based  Public  Key  Encryption

On the Leakage Resilience of Ring-LWE Based Public Key Encryption

... The analysis for Leakage Scenario II follows from the observation that the distribution of X conditioned on X + Y is now a non-spherical Gaussian, where leaked coordinates correspond to independent Gaussians with very ...

32

NTRU-KE:  A  Lattice-based  Public  Key  Exchange  Protocol

NTRU-KE: A Lattice-based Public Key Exchange Protocol

... Abstract. Public key exchange protocol is identified as an important application in the field of public-key ...existing public key exchange schemes are Diffie-Hellman (DH)-type, ...

12

Online Full Text

Online Full Text

... their survey, they concluded that there are three types of applications of VANETs: safety, convenience, and commercial applications. Examples of these include slow/stop vehicle advisor (SVA), emergency electronic brake ...

7

Direct  Chosen-Ciphertext  Secure  Attribute-Based  Key  Encapsulations  without  Random  Oracles

Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles

... Traditionally, encryption is viewed as a method of transmitting messages confidentially between a sender and a receiver, whereas nowadays encryption schemes are used for various applications. Consequently, conventional ...

19

Secure Public-Key Based Effective and Efficient Sensor Networks

Secure Public-Key Based Effective and Efficient Sensor Networks

... secure public-key based effective and efficient sensor network is first to be introduced and an algorithm for fast calculation based on 1’s complement of binary is also ...

6

Show all 10000 documents...

Related subjects