Zobrazeno 1 - 10
of 1 193
pro vyhledávání: '"Abel, C."'
Autor:
Chen, Abel C. H.
The blockchain system has emerged as one of the focal points of research in recent years, particularly in applications and services such as cryptocurrencies and smart contracts. In this context, the hash value serves as a crucial element in linking b
Externí odkaz:
http://arxiv.org/abs/2408.11950
Autor:
Chen, Abel C. H.
In recent years, with the advancement of quantum computing, mainstream asymmetric cryptographic methods in the current Public Key Infrastructure (PKI) systems are gradually being threatened. Therefore, this study explores X.509 security certificates
Externí odkaz:
http://arxiv.org/abs/2408.02179
Autor:
Chen, Abel C. H., Chang, Chia-Shen
In recent years, the countries of the world have drafted the specifications of connected cars; for instance, the Security Credential Management System (SCMS) has been proposed by United States Department of Transportation (USDOT), and the Cooperative
Externí odkaz:
http://arxiv.org/abs/2407.12810
Autor:
Chen, Abel C. H.
With the maturation of quantum computing technology, many cryptographic methods are gradually facing threats from quantum computing. Although the Grover algorithm can accelerate search speeds, current research indicates that the Advanced Encryption S
Externí odkaz:
http://arxiv.org/abs/2407.09490
Autor:
Chen, Abel C. H.
In recent years, quantum computers and Shor quantum algorithm have posed a threat to current mainstream asymmetric cryptography methods (e.g. RSA and Elliptic Curve Cryptography (ECC)). Therefore, it is necessary to construct a Post-Quantum Cryptogra
Externí odkaz:
http://arxiv.org/abs/2402.16002
Autor:
Chen, Abel C. H.
With the development of Shor's algorithm, some nondeterministic polynomial (NP) time problems (e.g. prime factorization problems and discrete logarithm problems) may be solved in polynomial time. In recent years, although some homomorphic encryption
Externí odkaz:
http://arxiv.org/abs/2402.14193
Autor:
Chen, Abel C. H.
The current blockchain system for cryptocurrency exchanges primarily employs elliptic curve cryptography (ECC) for generating key pairs in wallets, and elliptic curve digital signature algorithms (ECDSA) for generating signatures in transactions. Con
Externí odkaz:
http://arxiv.org/abs/2404.16837
Autor:
Chen, Abel C. H.
In recent years, the elliptic curve Qu-Vanstone (ECQV) implicit certificate scheme has found application in security credential management systems (SCMS) and secure vehicle-to-everything (V2X) communication to issue pseudonymous certificates. However
Externí odkaz:
http://arxiv.org/abs/2401.13691
Autor:
Chen, Abel C. H.
In IEEE 1609.2 and IEEE 1609.2.1 standards for Vehicle-to-everything (V2X) secure communication, various security algorithms based on Elliptic Curve Cryptography (ECC) have been adopted and designed. To enhance the efficiency of the Security Credenti
Externí odkaz:
http://arxiv.org/abs/2309.15340
In Vehicle-to-Everything (V2X) communications, providing accurate information and safeguarding the privacy of end entities is one of the crucial information security issues. Therefore, several international standardization organizations have begun to
Externí odkaz:
http://arxiv.org/abs/2311.03360