Sciweavers

147 search results - page 1 / 30
» Logarithmic keying
Sort
View
INDOCRYPT
2007
Springer
13 years 11 months ago
Solving Discrete Logarithms from Partial Knowledge of the Key
Abstract. For elliptic curve based cryptosystems, the discrete logarithm problem must be hard to solve. But even when this is true from a mathematical point of view, side-channel a...
K. Gopalakrishnan, Nicolas Thériault, Chui ...
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
13 years 10 months ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai
INFORMATICALT
2007
104views more  INFORMATICALT 2007»
13 years 5 months ago
Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level
The key agreement protocol based on infinite non-commutative group presentation and representation levels is proposed. Two simultaneous problems in group representation level are ...
Eligijus Sakalauskas, Povilas Tvarijonas, Andrius ...
AMC
2005
121views more  AMC 2005»
13 years 5 months ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao
TAAS
2008
62views more  TAAS 2008»
13 years 5 months ago
Logarithmic keying
Ehab S. Elmallah, Mohamed G. Gouda, Sandeep S. Kul...