Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Public-key cryptography"

ADD TO MY LIST
 
Comment on the Public Key Substitution Attacks

Author(s): Xiaofeng Chen | Fangguo Zhang | Baodian Wei
A Protocol for Digital Signature Based on the Elliptic Curve Discrete Logarithm Problem

Author(s): Morteza Nikooghadam | Mohammad Reza Bonyadi | Ehsan Malekian | Ali Zakerolhosseini
PUBLIC KEY CRYPTOGRAPHY WITH SYSTEM OF NON-HOMOGENEOUS EQUATIONS

Author(s): CH. RAVI KISHORE, | K.KRISHNA CHAITANYA | P.SATISH KUMAR
Design and Implementation of Block Method for Computing NAF

Author(s): Harsandeep Brar | Rajpreet Kaur
A Comparative Study of Public Key Cryptosystem based on ECC and RSA

Author(s): Arun kumar, | Dr. S.S. Tyagi, | Manisha Rana, | Neha Aggarwal, | Pawan Bhadana
Key Revocation System for DNSSEC

Author(s): Gilles Guette
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY

Author(s): Mohamed Elboukhari | Mostafa Azizi | Abdelmalek Azizi
ID-based Signcryption Scheme with (t,n) Shared Unsigncryption

Author(s): Fagen Li | Xiangjun Xin | Yupu Hu
Cryptanalysis of Security Enhancement for Anonymous Secure E-voting over a Network

Author(s): Chou-Chen Yang | Hung-Wen Yang | Ren-Chiun Wang
Weak Composite Diffie-Hellman

Author(s): Kooshiar Azimian | Javad Mohajeri | Mahmoud Salmasizadeh
Self Encrypting Data Streams for Digital Signals

Author(s): A.Chandra Sekhar, Ch.Suneetha, G.Naga Lakshmi
Design of An Efficient Neural Key Generation

Author(s): Asst. Prof. R. M.Jogdand1 | Sahana S.Bisalapur
Identity-Based Key Management in MANETs using Public Key Cryptography

Author(s): Dr. Anil Kapil | Mr. Sanjeev Rana
An ID-based Blind Signature Scheme from Bilinear Pairings

Author(s): B.Umaprasada Rao | K.A.Ajmath
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

Author(s): Rajesh P Singh | Anupam Saikia | B. K. Sarma
A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards

Author(s): Aqeel Khalique | Kuldip Singh | Sandeep Sood
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes

Author(s): L. Herna¡ndez Encinas | A. Marti­n del Rey | J. Munoz Masquue
Energy Saving Secure framework for Sensor Network using Elliptic Curve Cryptography

Author(s): Shish Ahmad | DR. Mohd. Rizwan beg | Dr. Qamar Abbas
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme

Author(s): Mohsen Toorani | Ali Asghar Beheshti Shirazi
Provable Partial Key Escrow

Author(s): Kooshiar Azimian | Javad Mohajeri | Mahmoud Salmasizadeh | Samuel S. Wagstaff, Jr.
Accelerating RSA Encryption Using Random Precalculations

Author(s): Loránd Szőllősi | Tamás Marosits | Gábor Fehér
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture

Author(s): Oliver Hanka | Michael Eichhorn | Martin Pfannenstein | Jörg Eberspächer | Eckehard Steinbach
Security Enhancement of Forward Digital Signatures Using ECC

Author(s): M.Rajasekhar | I.M.V.Krishna, | M.Samuel John
ENCRYPTION OF DATA STREAMS USING PAULI SPINS ½ MATRICES

Author(s): D. Sravana Kurmar | CH. Suneetha, | A. Chandra Sekhar
QUANTUM CRYPTOGRAPHY WITH PHOTON PAIRS

Author(s): Anand Sharma, | Vibha Ojha
SPACE-AGE APPROACH TO TRANSMIT MEDICAL IMAGE WITH CODEBASE CRYPTOSYSTEM OVER NOISY CHANNEL

Author(s): DEO BRAT OJHA, | , AJAY SHARMA, | ABHISHEK DWIVEDI | NITIN PANDEY, | AMIT KUMAR
On the key exchange with nonlinear polynomial maps of degree 4

Author(s): Aneta Wroblewska | Vasyl Ustimenko
A new encryption and signing algorithm

Author(s): Urszula Romañczuk
Guest Editorial

Author(s): Joel Rodrigues | Farid Farahmand | Wai Chen
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications

Author(s): Giovanni Agosta | Luca Breveglieri | Gerardo Pelosi | Martino Sykora
Analysis of the Security of BB84 by Model Checking

Author(s): Mohamed Elboukhari | Mostafa Azizi | Abdelmalek Azizi1
Cryptography by Karatsuba Multiplier with ASCII Codes

Author(s): Tarun Narayan Shankar | G.Sahoo
Secure Image Data by Double encryption

Author(s): Jayant Kushwaha | Bhola Nath Roy
Protocols for Secure Quantum Transmission: A Review of Recent Developments

Author(s): Muhammad Musharraf Ishtiaq Khan | Muhammad Sher
Secure Banking: Authenticating Peer-to-Peer Ad Hoc Interactions

Author(s): Khalid Mahmood | Imran Hameed | Khalid Rashid | Amir Qayyum
An Elliptic Curve-Based Signcryption Scheme with Forward Secrecy

Author(s): Mohsen Toorani | Ali Asghar Beheshti Shirazi
Constructing Efficient Certificateless Public Key Encryption with Pairing

Author(s): Yijuan Shi | Jianhua Li | Jianjun Shi
Practical E-Payment Scheme

Author(s): Mohammad Al-Fayoumi | Sattar J Aboud | Mustafa Al-Fayoumi
Software Implementations of Elliptic Curve Cryptography

Author(s): Zhijie Jerry Shi | Hai Yun
Knapsack Based ECC Encryption and Decryption

Author(s): R. Rajaram Ramasamy | M. Amutha Prabakar | M. Indra Devi | M. Suguna
A Review on Quantum Cryptography Technology

Author(s): Piya Techateerawat
Biometrics Based File Transmission Using RSA Cryptosystem

Author(s): Cryptography, Biometrics, RSA, DSS, KDC
Securing MMS with High Performance Elliptic Curve Cryptography

Author(s): B. N. Jagdale | R.K.Bedi | Sharmishta Desai
A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment

Author(s): Vivek Katiyar | Kamlesh Dutta | Syona Gupta
A Bit-Serial Multiplier Architecture for Finite Fields Over Galois Fields

Author(s): Hero Modares | Yasser Salem | Rosli Salleh | Majid T. Shahgoli
A Solution of Secure User-to-SP Messaging Using Identity-Based Cryptography

Author(s): Yu Dingguo | Chen Nan | Tan Chengxiang
A Novel Stegnosystem Design for Defying Differential Power Analysis Attacks on Smart Cards

Author(s): Hanan Mahmoud | Khaled Alghathbar | Alaaeldin Hafez
Comparative study of various PKINIT methods used in Advanced Kerberos

Author(s): Shital S. Thorat, | H. K. Sawant, | Sarita S. Gaikwad, | G. T. Chavan
EFFICIENT MAPPING METHODS FOR ELLIPTIC CURVE CRYPTOSYSTEMS

Author(s): O.SRINIVASA RAO | Prof. S. Pallam Setty
A New Algorithm for Creating Digital Certificate’s Private Key from Iris

Author(s): Mahboubeh Shamsi | AbdolReza Rasouli | Soudeh Shadravan | Farrokh Koropi
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings

Author(s): B.Umaprasada Rao & P.Vasudeva Reddy
An Improved Visual Cryptography Scheme for Secret Hiding

Author(s): G. Prasanna Lakshmi | J.A.Chandulal | KTV Reddy
An analytical survey on Network Security Enhancement Services

Author(s): Deshraj Ahirwar | Manish K. Ahirwar | Piyush K. Shukla | Pankaj Richharia
A Fuzzy QOS Keybase Secured Manet Routing with Multipath Data Fragmentation (FQKSMR)

Author(s): Manjunath Gadiparthi | Ramakrishna Paladugu | Sudhakar Paladugu | Muralidhar Vejendla
Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks

Author(s): Mohamed Hamdy Eldefrawy | Muhammad Khurram Khan | Khaled Alghathbar | Ahmed Saleh Tolba | Kyngn Jung Kim
A NEW VARIANT OF SUBSET-SUM CRYPTOSYSTEM OVER RSA

Author(s): Sonal Sharma | Saroj Hiranwal | Prashant Sharma
Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields

Author(s): Ch. Suneetha | D. Sravana Kumar | A. Chandrasekhar | K. Vanitha
DNA Computing based Elliptic Curve Cryptography

Author(s): P. Vijayakumar | V. Vijayalakshmi | G. Zayaraz
A Comparitive Study of Cryptosystems with Elliptic Curve Cryptography using Digital Signature

Author(s): Shipra Shukla | Dharmendra Lal Gupta | Anil Kumar Malviya
CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS

Author(s): D. SRAVANA KUMAR | CH. SUNEETHA | A.CHANDRASEKHAR
Public Key Cryptosystem Technique Elliptic Curve Cryptography with Generator g for Image Encryption

Author(s): Vinod Kumar Yadav | Dr. A.K. Malviya | D.L. Gupta | Satyendra Singh | Ganesh Chandra
A P2P Approach for Efficient Certificate Revocation in MANET

Author(s): Suresh Babu Tumula | K.R.R.Mohana Rao
Encryption Of Data Using Elliptic Curve Over Finite Fields

Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR
Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole
An Approach for SMS Security using Authentication Functions

Author(s): Neetesh Saxena | Narendra S. Chaudhari
A survey on biometric cryptosystems and cancelable biometrics

Author(s): Rathgeb Christian | Uhl Andreas
Tree Based Protocol for Key Management in Wireless Sensor Networks

Author(s): Messai M-L | Aliouat M | Seba H
Ergodic Matrix and Hybrid-key Based Image Cryptosystem

Author(s): Xiaoyi Zhou | Jixin Ma | Wencai Du | Yongzhe Zhao
Kryptos+Graphein= Cryptography

Author(s): Shweta Aggarwal | Utkarsh Jaiswal
Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks

Author(s): Hamed Jalali Qomi | Mohammad Hesam Tadayon
Mediated Certificateless Signature without Random Oracles

Author(s): Minghui Zheng | Jing Zhang | Zhi Zhang
Efficient Certificateless Signcryption Scheme from Weil Pairing

Author(s): Gang Yu | Hongzhi Yang | Shuqin Fan | Yong Shen | Wenbao Han
An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare

Author(s): Xuan Hung Le | Murad Khalid | Ravi Sankar | Sungyoung Lee
Guest Editorial

Author(s): Lei Shu | Hsiao-Hwa Chen | Takahiro Hara | Der-Jiunn Deng | Lei Wang
IKM -- An Identity based Key Management Scheme for Heterogeneous Sensor Networks

Author(s): Manel Boujelben | Habib Youssef | Rania Mzid | Mohamed Abid
A Survey of Identity-based Signcryption

Author(s): Li Fagen | Khan Muhammad
High Dynamic Range RNS Bases for Modular Multiplication

Author(s): Shirin Rezaie | Mohammad Esmaeildoust | Marzieh Gerami | Keivan Navi | Omid Hashemipour
Elliptic Curve Diffie Hellman technique extended for multiple two party keys at a time

Author(s): Vankamamidi S. Naresh | Nistala V.E.S. Murthy | V V Narasimha Rao
Risk Assessment of Authentication Protocol: Kerberos

Author(s): Pathan Mohd. Shafi | Abdul sattar | P. chenna Reddy
Architectural Analysis of RSA Cryptosystem on FPGA

Author(s): Vibhor Garg | V. Arunachalam
SECURE AND ROBUST IPV6 AUTOCONFIGURATION PROTOCOL FOR MOBILE ADHOC NETWORKS UNDER STRONG ADVERSARIAL MODEL

Author(s): Zohra Slimane | Abdelhafid Abdelmalek | Mohamed Feham | Abdelmalik Taleb-Ahmed
E-Voting Protocol Based On Public-Key Cryptography

Author(s): Hayam K. Al-Anie | Mohammad A. Alia | Adnan A. Hnaif
Cryptovirology: Virus Approach

Author(s): Shivale Saurabh Anandrao
Cryptographic Algorithms for Secure Data Communication

Author(s): Zirra Peter Buba | Gregory Maksha Wajiga
A Signcryption Scheme based on Elliptic Curve Cryptography

Author(s): R. K. Pateriya | Shreeja Vasudevan
A Review on Cryptography Mechanisms

Author(s): Prof ML Sharma | Er. Sheetal Atri
An Implementation of BLOWFISH Encryption Algorithm using KERBEROS Authentication Mechanism

Author(s): Ch Panchamukesh | Prof.T.Venkat Narayana Rao | A.Vijay Kumar
A REVIEW ON ELLIPTIC CURVE CRYPTOGRAPHY FOR EMBEDDED SYSTEMS

Author(s): Rahat Afreen | S.C. Mehrotra
A Practical BuyerSeller Watermarking Protocol based on Discrete Wavelet Transform

Author(s): Ashwani Kumar | Vipin Tyagi | Mohd Dilshad | Kapil Kumar
A PKI-based Track and Trace Network for Cross-boundary Container Security

Author(s): S.L. Ting | W.H. Ip | W.H.K. Lam | E.W.T. Ngai
Efficiency Analysis for Public Key Systems Based on Fractal Functions

Author(s): Nadia M.G. AL-Saidi | Mohamad R.M. Said | Adil M. Ahmed

Tango Jona
Tangokurs Rapperswil-Jona

     Affiliate Program