搜索结果: 16-26 共查到“军事学 Public Key Cryptography”相关记录26条 . 查询时间(0.218 秒)
Public Key Cryptography from Different Assumptions
Public Key Cryptography pseudorandom generator random graph
2009/6/5
In this work we give a construction of a public key encryption based on dierent assumptions. The
proposed system has, at this point, two major drawbacks. First, the new assumptions are not as well-s...
This paper introduces the concept of certificateless public key cryptography (CL-PKC).
In contrast to traditional public key cryptographic systems, CL-PKC does not require the
use of certificates to...
Combinatorial group theory and public key cryptography
Combinatorial group theory public key cryptography
2009/4/3
Combinatorial group theory and public key cryptography.
THE CONJUGACY SEARCH PROBLEM IN PUBLIC KEY CRYPTOGRAPHY: UNNECESSARY AND INSUFFICIENT
conjugacy search problem public key cryptography
2009/4/2
The conjugacy search problem in a group G is the problem of recovering
an x 2 G from given g 2 G and h = x¡1gx. This problem is in the core of several
recently suggested public key exchange pr...
Multivariate Quadratic Polynomials in Public Key Cryptography
Multivariate Quadratic Polynomials Public Key Cryptography
2009/3/13
This thesis gives an overview of Multivariate Quadratic polynomial equations
and their use in public key cryptography.
In the ¯rst chapter, some general terms of cryptography are introduced.
I...
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
Self-Generated-Certificate Public Key Cryptography Certificateless Signature Encryption Scheme Standard Model
2008/12/25
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of
Identity-Based Cryptography (IBC) while without having the problem of key escrow. However,
it does suffer to an attack...
USING DECISION PROBLEMS IN PUBLIC KEY CRYPTOGRAPHY
decision problems public key cryptography
2008/9/3
There are several public key establishment protocols as well as complete public key
cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by
now.
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
SIP certificateless public-key cryptography authentication key agreement
2008/8/22
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentication, which is vuln...
Optimizing Multiprecision Multiplication for Public Key Cryptography
Implementation Multi-precision arithmetic hybrid method
2008/6/2
In this paper we recall the hybrid method of Gura et al. for
multi-precision multiplication [4] which is an improvement on the basic
Comba method and which exploits the increased number of register...
Public Key Cryptography For The Financial Services Industry:ECDSA
Public Key Cryptography Financial Services Industry ECDSA
2008/5/19
(Informative)
Business practice has changed with the introduction of computer-based technologies. The substitution of electronic
transactions for their paper-based predecessors has reduced costs and...
Public Key Cryptography For The Financial Services Industry:Key Agreement and KeyTransport
Public Key Cryptography Financial Services Industry Key Agreement KeyTransport 公钥密码标准
2008/5/19
Notice -- This document is a draft document. It has not yet been processed through the consensus
procedures of X9 and ANSI.
Many changes which may greatly affect its contents can occur before this d...