نتایج جستجو برای: public key cryptosystems

تعداد نتایج: 896720  

2001
Seong-Hun Paeng Kil-Chan Ha Jae Heon Kim Seongtaek Chee Choonsik Park

Most public key cryptosystems have been constructed based on abelian groups up to now. We propose a new public key cryptosystem built on finite non abelian groups in this paper. It is convertible to a scheme in which the encryption and decryption are much faster than other well-known public key cryptosystems, even without no message expansion. Furthermore a signature scheme can be easily derive...

Journal: :IEICE Transactions 2006
Jumpei Uchida Nozomu Togawa Masao Yanagisawa Tatsuo Ohtsuki

Elliptic curve cryptosystems are expected to be a next standard of public-key cryptosystems. A security level of elliptic curve cryptosystems depends on a difficulty of a discrete logarithm problem on elliptic curves. The security level of a elliptic curve cryptosystem which has a public-key of 160-bit is equivalent to that of a RSA system which has a public-key of 1024-bit. We propose an ellip...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2002
Dima Grigoriev

Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of known cryptosystems which involve groups.

2012
Mohamed A. Nassar Layla A. A. El-Sayed

Data Security is the most important issue nowadays. A lot of cryptosystems are introduced to provide security. Public key cryptosystems are the most common cryptosystems used for securing data communication. The common drawback of applying such cryptosystems is the heavy computations which degrade performance of a system. Modular multiplication is the basic operation of common public key crypto...

Journal: :J. Network and Computer Applications 2004
Wei-Bin Lee Kuan-Chieh Liao

In 1984, Shamir proposed the concept of the Identity-Based (ID-Based) cryptosystem. Instead of generating and publishing a public key for each user, the ID-Based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large publickey file is not ...

2008
Martin Döring

Public-key cryptography is a key technology for making the Internet and other IT infrastructures secure. The security of the established public-key cryptosystems relies on the di culty of factoring large composite integers or computing discrete logarithms. However, it is unclear whether these computational problems remain intractable in the future. For example, Shor showed in 1994 [71] that qua...

2014
Nico Döttling

Public key cryptography is like magic. It allows two people who have never met before to communicate privately over any public channel. Since its conception in the 1970s, public key cryptography has become indispensable for the modern day connected world. Public key cryptography is essential for the https protocol, ecommerce, online auctions, online elections and many more. Computational hardne...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید