Diffie-Hellman-DSA
127 Followers
Recent papers in Diffie-Hellman-DSA
In today's period of the invasive figuring, the Internet has turned into the principle method of information correspondence. In such a situation, giving security to information turns into a mind boggling assignment. In Elliptic bend... more
Kriptoloji ve Kriptografi alanında Türkçe kaynağın yetersizliği nedeniyle, literatür taraması yardımıyla yazılmış bu dönem projesini faydalanmak isteyen herkese sunuyorum.
Advanced Image Steganography is used to develop a secure path for sending or receiving secret text messages. Using Chaff and Winnow& AES (Advanced Encryption Standard) encryption technique, the text message is encrypted and sent to... more
Cryptography is derived from a Greek word which means the art of protecting information by converting it into an unreadable format. In order to prevent some unwanted users or people to get access to the data cryptography is needed. RSA is... more
Kriptografi merupakan sebuah ilmu sekaligus seni untuk menjaga kerahasiaan pesan agar tetap aman. Kriptografi dengan algoritma kunci publik dapat digunakan pada digital signature dengan beberapa persyaratan yang harus dipenuhi. Digital... more
In this paper, we propose a non-commutative keyexchange scheme which generalizes the classical ElGamal Cipher to polycyclic groups. We describe the criteria for groups which would provide good candidates for such cryptosystems, we also... more
Security is one of the vital concerns especially in the current period with an extensive rise in the usage of the internet. So, an effective text encryption algorithm is of greater need for achieving an immense amount of privacy. In this... more
A brief look into the history around the treatment of encryption as a munition, regulated by governments like guns and missiles etc. Diffie and Hellman are discussed, as some thoughts on when information becomes a weapon, when math is a... more
wireless sensor network (WSN) is an unmistakable innovation for a long while. In most genuine applications, the immense measure of information assembled utilizing sensors are required to be put away and be made accessible for whenever,... more
Most common public key cryptosystems and public key exchange protocols presently in use, such as the RSA algorithm, Diffie-Hellman, and elliptic curve methods are number theory based and hence depend on the structure of abelian groups.... more
In the present paper, a new protocol for authentication and key distribution is proposed. The new protocol has the aim to achieve a comparable performance with the Kerberos protocol and overcome its drawbacks. For authentication of the... more
Bluetooth is a technology for connecting devices wirelessly to achieve data transfer at the rate of 720 kbps within a range of 10 to 100 meters. In existing authentication procedure for Bluetooth networks, four levels of key generation... more
We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in any Gap Diffie-Hellman (GDH) group (where the Computational Diffie-Hellman problem is hard but the Decisional... more
We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in any Gap Diffie-Hellman (GDH) group (where the Computational Diffie-Hellman problem is hard but the Decisional... more
In today's period of the invasive figuring, the Internet has turned into the principle method of information correspondence. In such a situation, giving security to information turns into a mind boggling assignment. In Elliptic bend... more
We propose and analyze two efficient signature schemes whose security is tightly related to the Diffie-Hellman problems in the random oracle model. The security of our first scheme relies on the hardness of the computational... more
Abstract: Cryptography is derived from a Greek word which means the art of protecting information by converting it into an unreadable format. In order to prevent some unwanted users or people to get access to the data cryptography is... more
A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme with the special property that anyone is able to verify the shares whether they are correctly distributed by a dealer. PVSS plays an important role... more
Smart grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. However, communication trust and security issues still present practical concerns to... more
Secure key distribution is a critical component in secure communications. Finding 'proven secure' practical key distribution systems is one of the major goals in cryptography. The Diffie-Hellman variants, a family of key... more
Failure of the wired equivalent privacy (WEP) protocol largely stimulated the research and development of a security protocols far wireless local area networks. Industry alliances and IEEE responded with WGFi Protected Access (WPA) and... more
Let $p$ be a prime and $\vartheta$ an integer of order $t$ in the multiplicative group modulo $p$. In this paper, we continue the study of the distribution of DiffieHellman triples $(\vartheta^x, \vartheta^y, \vartheta^{xy})$ by... more
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is... more
This paper presents an off-line anonymous e-cash schemes, that is secure under the strong RSA assumption and the strong Diffie-Hellman (SDH) assumption. A user can withdraw a wallet containing 2 k coins, each of which she can spend... more
We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in any Gap Diffie-Hellman (GDH) group (where the Computational Diffie-Hellman problem is hard but the Decisional... more
Together with rapid growth in mobile applications and cloud computing technology, mobile cloud computing has been introduced to be a potential technology for mobile services. Data violation event makes an end –to– end encryption which is... more
wireless sensor network (WSN) is an unmistakable innovation for a long while. In most genuine applications, the immense measure of information assembled utilizing sensors are required to be put away and be made accessible for whenever,... more
... 1055 Page 6. [7] Ms.PGRajeswari, Dr.K.Thilagavathi, An Efficient Authentication ... [9] K. Kaabneh and H. Al-Bdour, Key Exchange Protocol in Elliptic Curve Cryptography with No Public Point, American Journal of Applied Sciences 2... more
This work is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License Newcastle University ePrints-eprint.ncl.ac.uk
Attempts such as the standard 802.11i, in the domain of wireless communication, have been successful in securing the data-exchange procedures between hosts. However the secure exchange of management frames is yet to be addressed. In this... more
In this paper, we present an evaluation of possible ARM instruction set extension for Elliptic Curve Cryptography (ECC) over binary finite fields GF(2 m). The use of elliptic curve cryptography is becoming common in embedded domain, where... more
Recently, it has been proved that computational security can be automatically verified using the Dolev-Yao abstraction. We extend these results by adding a widely used component for cryptographic protocols: Diffie-Hellman exponentiation.... more
We analyze a key agreement algorithm realization, not using Diffie-Hellman approach, but using matrix powers and conjugation. Introduced in a theoretical frame by Sakalauskas et. al. in 2007, it is here implemented in J2ME on mobile... more
In this paper, we study the current security standards in multihop WiMAX networks and their security issues. For secured communications, hop-by-hop authentication is necessary for any multihop wireless networks [5][6]. WiMAX multihop... more
In the spirit of Diffie Hellman the concept of a protocol algebra is introduced using certain amalgamated free product of Braid group (B) and Thompson group (T ) together with a nilpotent subgroup H of index 2
FUNCIONES Los objetos fundamentales con los que trata el cálculo son las funciones. Surgen siempre de una cantidad que depende de otra. Por ejemplo en área de un círculo depende de su radio. La aceleración vertical a del suelo,... more
Most common public key cryptosystems and public key exchange protocols presently in use, such as the RSA algorithm, Diffie-Hellman, and elliptic curve methods are number theory based and hence depend on the structure of abelian groups.... more
We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous constructions. Previously, one-time digital signatures based on... more
... 1055 Page 6. [7] Ms.PGRajeswari, Dr.K.Thilagavathi, An Efficient Authentication ... [9] K. Kaabneh and H. Al-Bdour, Key Exchange Protocol in Elliptic Curve Cryptography with No Public Point, American Journal of Applied Sciences 2... more