The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Public key cryptosystem a pair of related keys is used by the sender and the receiver. In either the public key or secret key cryptosystem the plain text is considered as an integer number that leads to poor security. In this paper we propose an Quartic Bezier curve based public key cryptosystem over Galois field GF(nm). The plain text is considered as a (x, y) coordinate over the Bezier curve...
Public key cryptosystem or the asymmetric crypto system is more secure than secret key method because of a pair of related keys used by both sender and receiver. The problem in most of the cryptosystem is that the plain text is considered as an integer number that leads poor security. In this paper we propose an efficient Bezier curve based public key cryptography technique over Galois field GF(pm...
This paper constructs a new EL Gamal-type public key cryptosystem based on the irreducibility of characteristic polynomial of ergodic matrices over, whose security is equivalent to the difficulty of polynomial discrete logarithm problem over binary finite field. Since plaintext is represented by matrix and its message expansion is almost 1, the novel scheme can encrypt effectively more information...
At this moment, main problems of global smart card are created with Rivest-Shamir-Adleman (RSA) public key algorithm because long key length and slow decryption time. Alternative public key encryption can solve these two problems such as Elliptic Curve Cryptography (ECC). Mathematic background of ECC is based on coordinate systems that two main arithmetic operations are explained and RSA encryption...
RSA-like public-key cryptosystem that allows high-speed encryption and decryption is developed. The security of a system is based on the complexity of finding of irreducible polynomials over extended Galois fields.
In this paper, we propose an elliptic curve cryptographic (ECC) architecture for a lower hardware resource. In our work, the different paths of encryption and decryption could be chosen, and the elliptic curve (EC) is based on GF (2163). The EC scalar multiplication is a main operation module that includes add, Montgomery multiplier and inverse in ECC architecture. All modules are organized in a hierarchical...
This paper deals with the elliptic curve encryption algorithm. Its safety is analyzed using the Schoof method. The algorithm work results allow to define a define a secret key in a simple way.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.