Elliptic Curve Video Encryption in Mobile Phone Based on Multi-Keys and Chaotic Map

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

Chaotic Map based Block Encryption

Number of cryptosystems based on chaos has been proposed, in recent years. Tao Xiang , Kwok-wo Wong, Xiaofeng Liao in 2008 proposed an improved scheme by using a symmetric key block cipher algorithm in which one-dimensional chaotic maps are used, in order to obtain chaotic sequences with better cryptographic feature. In this system, an encryption /decryption scheme was proposed, a cryptographic...

متن کامل

A Modified Menezes-Vanstone Elliptic Curve Multi-Keys Cryptosystem

This paper proposes a new modified variant of Menezes and Vanstone elliptic curve cryptosystem. This new variant uses the same original Menezes and Vanstone elliptic curve cryptosystem but in an elegant way. The new variant uses a not only one elliptic curve but a number of curves. Each curve is chosen with its corresponding keys to constitute a separate cryptosystem. The message is then divide...

متن کامل

Generating Keys in Elliptic Curve Cryptosystems

In this paper, we will present how to find keys elliptic curve cryptosystems (ECC) with simple tools of Delphi 7 console application, using the software problem solving of the scalar point multiplication in the field GF (p), where p is an arbitrary prime number.

متن کامل

A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem

A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an authenticated cipher-text for a message and only the designated verifier can verify the message. Recently, Chung et al. [1] proposed a (t, n) threshold authenticated encryption scheme by applying a division-of-labor signature technique. However, we showed that the scheme has a design flaw. Then, we propo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Al-Mustansiriyah Journal of Science

سال: 2018

ISSN: 2521-3520,1814-635X

DOI: 10.23851/mjs.v29i2.438