-
41
Cryptanalysis of El-Gamal AAs cryptosystem
Published 2011“…The key exchange protocol of the AAs cryptosystem is analogous to the Diffie-Hellman key exchange protocol. The encryption and decryption processes of the AAs -cryptosystem are efficient since the operations involved are the simple addition and subtraction modulo 1. …”
Get full text
Thesis -
42
Handbook of Research on Secure Multimedia Distribution /
Published 2009Get full text
software, multimedia -
43
A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting
Published 2017-12-01“…Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. …”
Get full text
Article -
44
Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application
Published 2023-07-01“…The public key elliptic curve discrete logarithmic problem (EC-DLP) is used for elliptic curve Diffie–Hellman key exchange (EC-DHKE) in order to generate a shared session key, which is used as the chaotic system’s beginning conditions and control parameters. …”
Get full text
Article -
45
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
Published 2016“…For RSA encryption and decryption, ElGamal digital signature and Diffie-Hellman key exchange are some of the well-known example of these cryptosystems which benefit from these operations. …”
Get full text
Thesis -
46
Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs
Published 2021-05-01“…Third, the mutual authentication prevents any leakage from the mix zones’ symmetric keys by generating a fresh one for each communication through a Diffie–Hellman key exchange.…”
Get full text
Article -
47
Shor's Factoring Algorithm and Modular Exponentiation Operators
Published 2023-09-01“…Shor's algorithm therefore has profound implication for public-key encryption such as RSA and Diffie–Hellman key exchange. We assume no prior knowledge of Shor's algorithm beyond a basic familiarity with the circuit model of quantum computing. …”
Get full text
Article -
48
Privacy Protection Method for Blockchain Transactions Based on the Stealth Address and the Note Mechanism
Published 2024-02-01“…Firstly, the proposed method generates a random seed known only to the parties involved based on the Diffie–Hellman key exchange protocol, ensuring the privacy of transactions. …”
Get full text
Article -
49
Lightweight identity based online/offline signature scheme for wireless sensor networks
Published 2022“…Multiple traditional reliable encryption methods like RSA encryption-decryption and Diffie–Hellman key exchange face a crisis of computational resources due to limited storage, low computational ability, and insufficient power in lightweight WSNs. …”
Get full text
Thesis -
50
Secure cross-layer routing protocol with authentication key management scheme for manets
Published 2023-10-01“…ECC (Elliptical curve cryptography) and Diffie-Hellman key exchanges with bilinear maps improve security of communications. …”
Get full text
Article