A hybrid cryptographic system providing digital authentication is described and analyzed in this paper. The proposed cryptosystem incorporates three features: complexity of the discrete logarithm problem, complexity of integer factorization of a product of two large primes and a combination of symmetric and asymmetric keys. In order to make the cryptosystem less vulnerable to cryptanalytic attacks a concept of digital entan-glements is introduced. As a result, the proposed cryptographic system has four layers (entanglement-encryption-decryption-disentanglement). It is shown that in certain instances the proposed communication cryptocol is many times faster than the RSA cryptosystem. Examples provided in the paper illustrate details of the p...
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and pu...
Abstract — Diffie-Hellman is public key based symmetric key algorithm used for secret key sharing be...
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and pu...
Current needs of human communication came to status, when most of transferred messages are considere...
This paper describes and compares a variety of algorithms for secure transmission of information via...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
In this paper, we propose a threshold authenticated encryption scheme using both factoring and discr...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
We present a new digital signature scheme with message recovery and its authenticated encryption bas...
[[abstract]]The advancement of public-key cryptography in recent years has offered strong background...
Abstract-A new signature scheme is proposed, together with an imple-mentation of the Diffie-Hellman ...
Abstract: Digital signature scheme is a fundamental cryptographic tool which allows one to sign an e...
A symmetric cipher such as AES in cryptography is much faster than an asymmetric cipher but digital ...
To make users put much confidence in digital signatures, this paper proposes the first provably secu...
[[abstract]]Recent studies on key authentication scheme such as ID-based schemes, certificate-based ...
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and pu...
Abstract — Diffie-Hellman is public key based symmetric key algorithm used for secret key sharing be...
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and pu...
Current needs of human communication came to status, when most of transferred messages are considere...
This paper describes and compares a variety of algorithms for secure transmission of information via...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
In this paper, we propose a threshold authenticated encryption scheme using both factoring and discr...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
We present a new digital signature scheme with message recovery and its authenticated encryption bas...
[[abstract]]The advancement of public-key cryptography in recent years has offered strong background...
Abstract-A new signature scheme is proposed, together with an imple-mentation of the Diffie-Hellman ...
Abstract: Digital signature scheme is a fundamental cryptographic tool which allows one to sign an e...
A symmetric cipher such as AES in cryptography is much faster than an asymmetric cipher but digital ...
To make users put much confidence in digital signatures, this paper proposes the first provably secu...
[[abstract]]Recent studies on key authentication scheme such as ID-based schemes, certificate-based ...
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and pu...
Abstract — Diffie-Hellman is public key based symmetric key algorithm used for secret key sharing be...
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and pu...