Zobrazeno 1 - 10
of 237
pro vyhledávání: '"ECDLP"'
Autor:
Sala Massimiliano, Taufer Daniele
Publikováno v:
Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp 843-939 (2024)
We characterize the possible groups E(Z∕NZ)E\left({\mathbb{Z}}/N{\mathbb{Z}}) arising from elliptic curves over Z∕NZ{\mathbb{Z}}/N{\mathbb{Z}} in terms of the groups E(Fp)E\left({{\mathbb{F}}}_{p}), with pp varying among the prime divisors of NN.
Externí odkaz:
https://doaj.org/article/6db1f8255316439cb89a500d805a9f06
Autor:
Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Mou Dasgupta, Ashok Kumar Das, Youngho Park
Publikováno v:
IEEE Open Journal of the Computer Society, Vol 5, Pp 329-342 (2024)
Radio Frequency Identification (RFID) promotes the fundamental tracking procedure of the Internet of Things (IoT) network due to its autonomous data collection as well as transfer incurring low costs. To overcome the insecure exchange of tracking dat
Externí odkaz:
https://doaj.org/article/67b663a2802640138047a5b43bf661d1
Autor:
Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Mou Dasgupta, Ashok Kumar Das, Youngho Park
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 5, Pp 583-598 (2024)
Traditional voting systems mainly comprise of paper polling, electronic ballot system (EVM), mechanical devices, etc., and demand the physical presence of the voters. In the new age of digitization, the electronic voting system has come up with a uni
Externí odkaz:
https://doaj.org/article/893c828bf2ac430eac591149a9252d54
Publikováno v:
IEEE Access, Vol 11, Pp 45243-45254 (2023)
One of the fundamental construction blocks in safeguarding group communications is group key establishment protocols. Group key agreement protocols are more suitable for distributed environments where the participant from various places can agree upo
Externí odkaz:
https://doaj.org/article/f4f90d80ba1d4c42ac142897cfbed426
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 10, Pp 114393-114401 (2022)
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud. Most existing attribute-based blind signature schemes have complex bilinear pairin
Externí odkaz:
https://doaj.org/article/ee0727f8af1d491d9571d5770866235d
Publikováno v:
IEEE Access, Vol 10, Pp 34221-34227 (2022)
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages. At this time, the traditional blind signature can no lon
Externí odkaz:
https://doaj.org/article/10a3b1996f744e74acecc4bc28d4dc38
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 10, Pp 1211-1218 (2021)
Public Key Cryptosystem (PKC) completely relies under the assumption that user’s private key is absolutely secure. Exposure of private key may lead to disastrous situations in the communication network. To diminish the damage of private key exposur
Externí odkaz:
https://doaj.org/article/bb515a61d7634e69a025a868043d1283
Publikováno v:
Cybernetics and Information Technologies, Vol 21, Iss 4, Pp 105-118 (2021)
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology o
Externí odkaz:
https://doaj.org/article/d6d32d7f5606450db7c92c680c406cc6
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.