Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Gyu Chol Kim"'
Publikováno v:
PLoS ONE, Vol 18, Iss 11, p e0294840 (2023)
In order to prove the ElGamal CCA(Chosen Ciphertext Attack) security in the random oracle model, it is necessary to use the group where ICDH(Interactive Computational Diffie Hellman) assumption holds. Until now, only bilinear group with complex algeb
Externí odkaz:
https://doaj.org/article/1e05cb0891cf4867942b385ae546f83f
Publikováno v:
Theoretical Computer Science. :1-19
In RSA, private exponent is usually obtained from the preselected public exponent by extended Euclid algorithm and is roughly the same bit size as a modulus number. If the private exponent is preselected as in rebalanced RSA, then the public exponent
Autor:
Gyu-Chol Kim, Su-Chol Li
Publikováno v:
PLoS ONE, Vol 15, Iss 10, p e0240248 (2020)
PLoS ONE
PLoS ONE
Public key cryptosystems such as RSA, rebalanced RSA and ElGamal have the disadvantage of serious asymmetry between encryption and decryption speed. We reduced the CRT (Chinese Remainder Theorem) exponents maintaining full sized private exponent in E
Autor:
Kim, Gyu Chol1 (AUTHOR) kgc841110@star-co.net.kp, Ji, Hyon A.1 (AUTHOR), Jong, Yong Bok1 (AUTHOR), Kim, Gwang Hyok1 (AUTHOR), Kim, Hak Su1 (AUTHOR)
Publikováno v:
PLoS ONE. 11/30/2023, Vol. 18 Issue 11, p1-17. 17p.
Autor:
Kim, Gyu Chol, Han, Gang Song, Kim, Ryong Chol, Jong, Yong Bok, Kim, Nam Hyok, Han, Il Min, Han, Ung Il
Publikováno v:
Security & Communication Networks; 7/15/2023, p1-12, 12p