• No results found

public-key cryptographic protocols

Key Management Schemes in MANET: A Review

Key Management Schemes in MANET: A Review

... of key management protocols. Key integrity and ownership should be protected from advanced key ...the public key is protected by the public-key certificate, in ...

10

Kleptography  trapdoor  free  cryptographic  protocols

Kleptography trapdoor free cryptographic protocols

... session key Alice during the protocol normal working and then tries to use it to key agreement with the other side (say Dev ...the public key IDs Alice and Bob, it’s recognized by Dev side as ...

13

Efficiency  Evaluation  of  Cryptographic  Protocols  for  Boardroom  Voting

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

... ElGamal key generation and threshold ElGamal decryption The ElGamal cryptosystem comes with the shortcoming that the private key might be misused by one entity ...investigated protocols address this ...

19

Volume 2, Issue 3, March 2013 Page 72

Volume 2, Issue 3, March 2013 Page 72

... environments. Cryptographic algorithms provide the underlining tools to most security protocols used in today’s ...symmetric key use to public key ...

9

Cryptographic Protocols Based on Nielsen Transformations

Cryptographic Protocols Based on Nielsen Transformations

... sharing protocols and a combinatorial distributions of shares, which are given by ...private key cryptosystem and finally Nielsen transformations are used for a public key cryptosystem which ...

46

Classical  Cryptographic  Protocols  in  a  Quantum  World

Classical Cryptographic Protocols in a Quantum World

... quantum protocols are relatively ...quantum protocols and ad- versaries by Ben-Or and Mayers [5] and Unruh [67, ...quantum protocols (key exchange [6] and multi-party computation with honest ...

37

Abstracting cryptographic protocols

Abstracting cryptographic protocols

... for protocols built upon our abstraction of ...secure cryptographic realization of our symbolic abstraction of ...(non-interactive) cryptographic primitives used in the symbolic protocol and within ...

317

Domain-specific  Accelerators  for  Ideal  Lattice-based  Public  Key  Protocols

Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols

... for key exchange, NewHope, and digital signature, ...for public key cryptography use cases, the exploration framework focuses on a template design of a loosely coupled, cache-based domain specific ...

17

The Peruvian coin flip Cryptographic protocols

The Peruvian coin flip Cryptographic protocols

... kept public. The result is the so-called “public key cryptosystem” of Activity 18, Kid Krypto, that is now regarded as the only completely secure way of exchanging ...

11

Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction

Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction

... established cryptographic scheme can be used to initiate any communication, and further users may switch to some lightweight process so that the degree of secrecy is maintained by means of the public ...

5

A COMPLETE SECURED CRYPTOGRAPHIC FRAMEWORK FOR CLOUD COMPUTING ENVIRONMENTS

A COMPLETE SECURED CRYPTOGRAPHIC FRAMEWORK FOR CLOUD COMPUTING ENVIRONMENTS

... Available Online at www.ijpret.com 471 protocols. Open SSL is an open source implementation of SSL, which can be used with other applications for secure communications. Another product is eToken [8]. It provides ...

13

IMPLEMENTATION AND PERFORMANCE EVALUATION OF MODULO AND MONTGOMERY MULTIPLIERS IN REAL TIME APPLICATION

IMPLEMENTATION AND PERFORMANCE EVALUATION OF MODULO AND MONTGOMERY MULTIPLIERS IN REAL TIME APPLICATION

... a public-key cryptosystem, the private key is always linked mathematically to the public ...a public-key system by deriving the private key from the public ...

11

Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations

Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations

... the key exchange ...the public key in the server certificate is an RSA key transport public key that should be used by the client for sending the premaster secret to the ...

67

Performance analysis of cryptographic protocols on handheld devices

Performance analysis of cryptographic protocols on handheld devices

... used for a wide variety of applications in the wired Internet. Our investigation covered the SSL protocol that provides transport-layer security by protecting all traffic that utilizes TCP, S/MIME that can be used to ...

6

Ensuring Confidentiality in Cryptographic Protocols with the Witness-Functions

Ensuring Confidentiality in Cryptographic Protocols with the Witness-Functions

... Cryptographic protocols are short programs intended to ensure some security properties in communications using cryptographic ...lots protocols too many years after of their use ...in ...

15

Secure Search Scheme over Encrypted Cloud Data Using Greedy Depth First Search Algorithm

Secure Search Scheme over Encrypted Cloud Data Using Greedy Depth First Search Algorithm

... In Data user module, Initially Data user must have to register their detail and TGC will authorize the registration by sending user id, name through email. After successful login he/ can search all the files upload by ...

6

A. The Diffie-Hellman protocol

A. The Diffie-Hellman protocol

... this key exchange protocol in wireless sensor networks has many ...secret key on an insecure ...secret key of the system, only the current exchange is affected, but not the ...

5

Securing Mobile Payment Systems: Using Personal Identification Number (PIN) Method

Securing Mobile Payment Systems: Using Personal Identification Number (PIN) Method

... the cryptographic converter. The cryptographic converter in figure 3 obtains the public key encrypted PIN from the mobile payment device via the ...RSA public key encrypted PIN ...

12

Deniable Key Exchange for Privacy Preservation in ON-LINE Shopping

Deniable Key Exchange for Privacy Preservation in ON-LINE Shopping

... main cryptographic tool used is the key exchange ...Hellman key exchange (DHKE) is ...the key through ...Internet key-exchange ...session key can be generated from DH-components ...

5

Improved SPI Calculus for Reasoning on Cryptographic Protocols

Improved SPI Calculus for Reasoning on Cryptographic Protocols

... This section introduces the language of Tspi calculus. Names and operators are the basic constructs the syntax of Tspi calculus. Other structures are built based on them. Protocol model, is representative structure of ...

8

Show all 10000 documents...

Related subjects