In this paper, a new cryptosystem will be developed which is analogue to ElGamal encryption scheme and based on Lucas sequence in the elliptic curve group over finite field. In this encryption scheme, an Elliptic curve Diffie-Hellman (ECDH) key agreement be the first part of the encryption, the keys of this encryption scheme is defined based on elliptic curve and the order of the group G. The Lucas sequence will be used for the computations of plaintext and ciphertext in the process of encryption and decryption respectively
Abstract:- The system we propose is a mathematical problem with the necessary properties to define p...
Cryptography is an evolving field that research into discreet mathematical equation that is represen...
In the thesis we study the elliptic curves and its use in cryptography. Elliptic curvesencompasses a...
Elliptic Curve Cryptography is a cryptography based on the algebraic structure of elliptic curves ov...
This paper reports a security analysis on the Lucas Based El-Gamal Cryptosystem in the ...
The success of Garbage-man-in-the-middle (GMITM) attack relies on the possibility to access to the ...
This paper reports on a Lenstra’s attack against the Lucas based El-Gamal Cryptosystem in the ellipt...
Common modulus attack is one of the various homomorphic attacks based on homomorphism nature of cryp...
The application of elliptic curves to the field of cryptography has been relatively recent. It has o...
Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryp...
The fast paced development of new technologies continues to advance the newest security measures and...
Abstract:- We propose a new system that is applicable to public key cryptography. The system is a va...
The group of the elliptic curve points forms an abelian group, which is considered as a suitable cho...
The aim of this project was to create a functional implementation of Elliptic Curve Cryptography (EC...
Security of the information is the main problem in network communications nowadays. There is no algo...
Abstract:- The system we propose is a mathematical problem with the necessary properties to define p...
Cryptography is an evolving field that research into discreet mathematical equation that is represen...
In the thesis we study the elliptic curves and its use in cryptography. Elliptic curvesencompasses a...
Elliptic Curve Cryptography is a cryptography based on the algebraic structure of elliptic curves ov...
This paper reports a security analysis on the Lucas Based El-Gamal Cryptosystem in the ...
The success of Garbage-man-in-the-middle (GMITM) attack relies on the possibility to access to the ...
This paper reports on a Lenstra’s attack against the Lucas based El-Gamal Cryptosystem in the ellipt...
Common modulus attack is one of the various homomorphic attacks based on homomorphism nature of cryp...
The application of elliptic curves to the field of cryptography has been relatively recent. It has o...
Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryp...
The fast paced development of new technologies continues to advance the newest security measures and...
Abstract:- We propose a new system that is applicable to public key cryptography. The system is a va...
The group of the elliptic curve points forms an abelian group, which is considered as a suitable cho...
The aim of this project was to create a functional implementation of Elliptic Curve Cryptography (EC...
Security of the information is the main problem in network communications nowadays. There is no algo...
Abstract:- The system we propose is a mathematical problem with the necessary properties to define p...
Cryptography is an evolving field that research into discreet mathematical equation that is represen...
In the thesis we study the elliptic curves and its use in cryptography. Elliptic curvesencompasses a...