Elliptic Curve Cryptosystem for Email Encryption

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem

A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an authenticated cipher-text for a message and only the designated verifier can verify the message. Recently, Chung et al. [1] proposed a (t, n) threshold authenticated encryption scheme by applying a division-of-labor signature technique. However, we showed that the scheme has a design flaw. Then, we propo...

متن کامل

The Elliptic Curve Cryptosystem

The Elliptic Curve Cryptosystem (ECC) provides the highest strength-per-bit of any cryptosystem known today. This paper provides an overview of the three hard mathematical problems which provide the basis for the security of publickey cryptosystems used today: the integer factorization problem (IFP), the discrete logarithm problem (DLP), and the elliptic curve discrete logarithm problem (ECDLP)...

متن کامل

1 Elliptic Curve Cryptosystem and its Applications

The goal of this research is to develop a basis for utilizing efficient encryption schemes in wireless communications and in devices with low computing power and resources. Elliptic Curve Cryptography (ECC) fits well for an efficient and secure encryption scheme. It is more efficient than the ubiquitous RSA based schemes because ECC utilizes smaller key sizes for equivalent security. A comparat...

متن کامل

ECCPERT Elliptic Curve Cryptosystem Development and Design

ECCpert is an implementation of an Elliptic Curve Cryptosystem which is based over a finite field from special class called Optimal Extension Fields (OEFs). OEFs utilise the fast integer arithmetic available on modern processors to produce very efficient results. Thus, they do not need to resort to multiprecision operations or arithmetic using polynomials of large degree. This paper discusses t...

متن کامل

A Secure and Efficient Convertible Authenticated Encryption Scheme with Message Linkages Using Elliptic Curve Cryptosystem

A convertible authenticated encryption scheme is very useful for transmitting a confidential message in insecure communication networks. This paper proposes a convertible authenticated encryption scheme with message linkages for message flows using Elliptic Curve Cryptography (ECC). The proposed scheme has the following advantages. (1) It can provide non-repudiation when the signer repudiates h...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer and Communication Technology

سال: 2010

ISSN: 2231-0371,0975-7449

DOI: 10.47893/ijcct.2010.1049