cryptosystem相关论文
The break of PKCY is reduced to a break of the related equi-effect cryptosystem, and a method for obtaining the equi-eff......
In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted esc......
An attack algorithm is proposed on a finite automaton public key cryptosystem.It is proved that this attack can break FA......
The classical RSA is vulnerable to low private exponent attacks (LPEA) and has homomorphism. KMOV based on elliptic curv......
The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption sch......
In this paper,we study the RSA public key cryptosystem in a special case with the private exponent d larger than the pub......
An embedded cryptosystem needs higher reconfiguration capability and security.After analyzing the newly emerging side-ch......
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure i......
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist th......
Internet voting protocols is the base of the Internet voting systems. In this paper a new practical Internet voting prot......
We study security of some homomorphic cryptosystems with similar algebraic structure. It is found out that those cryptos......
针对2个具有完美前向机密性的鲁棒电子邮件协议所存在的安全缺陷,分析了2个协议所面临的协议攻击,并得出了相应的改进方案.首先,通......
In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original si......
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying ......
Cryptography is an important tool in the design and implementation of e-voting schemes since it can provide verifiabilit......
...
FAPKC4, a public key cryptosystem based on automata theory, is generalized so that component automata of compound autom......
The chaos-based feedforward output functions for combining keystream generators are proposed according to chaotic dynam......
In this dissertation, sereral key problems in the field of steganographic image security are mainly studied and discusse......
In this paper, two improved digital signature schemes are presented based on the design of directed signature scheme [3]......
In key escrow field it is important to solve the problem that user’s secret key completely depends on the trusted escro......
A novel cryptosystem based on subband decomposition independent component analysis(SDICA)is proposed in this work,where ......
Key-privacy is a notion of security that is concerned with the key anonymity in public-key encryption.Some popular schem......
Twisted Edwards curves over finite fields have attracted great interest for their efficient and unified addition formula......
本文用线性代数和集合论的某些知识,提出了两种新型的方案,它们都很好地实现了Shamir提出的通信密钥分散管理的要求。
In this pa......
Two types of new subliminal channels are constructed respectively based on provable secure public key cryptosystems and......
The design and implementation of fast algorithms related to Elliptic Curve Cryptography (ECC) over the field GF(p), suc......
A new elliptic curve scalar multiplication algorithm is proposed. The algorithm uses the Frobenius map on optimal extens......
Based on the characteristic of key-insulated public-key cryptosystem, we propose a distributed random session keys distr......
RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptos......
A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwh......
In chaotic cryptosystems, using (very) high dimensional chaotic attractors for encrypting a given message maybe can impr......
Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability......
FPGA IMPLEMENTATION OF RSA PUBLIC-KEY CRYPTOGRAPHIC COPROCESSOR BASED ON SYSTOLIC LINEAR ARRAY ARCHI
In order to make the typical Montgomery’s algorithm suitable for implementation on FPGA, a modified version is proposed......
椭圆曲线密码体制[1] (Elliptic Curve Cryptosystem,ECC)是目前已知的单位密钥安全性最高的一种公钥加密体制。本文在深入研......
The paper proposes a new sequential digital multi-signature scheme based on Knapsack public-key cryptosystem,which is di......
DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmet......
Combined with two chaotic maps, a novel alternate structure is applied to image cryptosystem. In proposed algorithm, a g......
The 21st century is the age of information when information becomes an important strategic resource. The information obt......
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments,......
In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a tra......
Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user’s private key distri......
It is well known that the Chinese Remainder Theorem(CRT)can greatly improve the performances of RSA cryptosystem in both......
Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack and combine wi......
Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that a......
Boneh and Durfee have developed a cryptanalytic algorithm on low private key RSA.The algorithm is based on lattice basis......
Digital signature is one of the most important cryptographic primitives. We proposed a new digital signature scheme base......