搜索结果: 1-10 共查到“军事学 Elliptic Curve Cryptosystem”相关记录10条 . 查询时间(0.109 秒)
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem
RSA Cryptanalysis Coppersmith's method
2019/9/19
Let N=pqN=pq be an RSA modulus and ee be a public exponent. Numerous attacks on RSA exploit the arithmetical properties of the key equation ed−k(p−1)(q−1)=1ed−k(p−1)(q...
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
public-key cryptography KMOV
2019/9/19
This paper presents two new improved attacks on the KMOV cryptosystem. KMOV is an encryption algorithm based on elliptic curves over the ring ZNZN where N=pqN=pq is a product of two large primes of eq...
Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem
Elliptic Curves Cryptosystems(ECC) RSA ASIC
2016/1/27
The strength of ECC lies in the hardness of elliptic curve
discrete logarithm problem (ECDLP) and the hight level security with
significantly smaller keys. Thus, using smaller key sizes is a gain in...
A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem
RFID identification protocol privacy
2011/7/25
Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based.
A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem
radio frequency identification RFID identification protocol privacy
2012/3/27
Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based. The symmetric key based systems ...
A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem
deniability deniable authentication protocol Fiat-Shamir heuristic perfect zero-knowledge simulatability
2010/11/2
Recently, many non-interactive deniable authentication (NIDA) protocols have been proposed. They are mainly composed of two types, signature-based and shared-secrecy based. After reviewing these schem...
An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
ID-based Mutual authentication Key agreement
2010/2/1
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication
and key agreement scheme for mobile devices on elliptic curve cryptosystem. In this paper, we
show that Yoon et al.’s ...
Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
ID-based mutual authentication key agreement
2009/11/18
Most recently, Yang et al proposed an ID-based remote mutual authentication with
key agreement scheme for mobile devices on elliptic curve cryptosystem in journal of
Computer and Security. In this p...
A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem
Hardware Analysis Twisted Edwards Curves Elliptic Curve Cryptosystem
2009/6/11
This paper presents implementation results of a reconfig-
urable elliptic curve processor defined over prime fields GF(p). We use
this processor to compare a new algorithm for point addition and poi...
An efficient semantically secure elliptic curve cryptosystem based on KMOV
public-key cryptography semantic security elliptic curves
2009/4/13
We propose an elliptic curve scheme over the ring Zn2 , which is efficient
and semantically secure in the standard model. There appears to be no previous
elliptic curve cryptosystem based on factori...