Common modulus attack is one of the various homomorphic attacks based on homomorphism nature of cryptosystems. This type of attack requires a plaintext encrypted under same modulus while two encryption keys are relatively prime to each other. In this paper, an investigation was carried out to evaluate the nature of a homomorphic attack on the Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field. The attack can be proven by using extend Euclidean algorithm together with composite and reverse functions of Lucas and Fibonacci sequences. Results showed that common modulus attack can be used to obtain the original plaintexts. Thus, it is dangerous to send a plaintext to two different users using same modulus. Sender mu...
This paper introduces "hyper-and-elliptic-curve cryptography", in which a single high-security group...
International audienceIn 1995, Kuwakado, Koyama and Tsuruoka presented a new RSA-type scheme based o...
At the beginning the paper describes the basic properties of finite fieldarithmetic and elliptic cur...
Common modulus attack is one of the various homomorphic attacks based on homomorphism nature of cryp...
The success of Garbage-man-in-the-middle (GMITM) attack relies on the possibility to access to the ...
Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryp...
Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its hom...
This paper reports on a Lenstra’s attack against the Lucas based El-Gamal Cryptosystem in the ellipt...
This paper reports a security analysis on the Lucas Based El-Gamal Cryptosystem in the ...
Elliptic Curve Cryptography is a cryptography based on the algebraic structure of elliptic curves ov...
In this paper, a new cryptosystem will be developed which is analogue to ElGamal encryption scheme a...
The LUC4,6 cryptosystem is a system analogy with RSA cryptosystem and extended from LUC and LUC3 cry...
Cryptography is an evolving field that research into discreet mathematical equation that is represen...
Security of the information is the main problem in network communications nowadays. There is no algo...
To date, elliptic curves offer the most efficient cryptographic solution. Particularly efficient amo...
This paper introduces "hyper-and-elliptic-curve cryptography", in which a single high-security group...
International audienceIn 1995, Kuwakado, Koyama and Tsuruoka presented a new RSA-type scheme based o...
At the beginning the paper describes the basic properties of finite fieldarithmetic and elliptic cur...
Common modulus attack is one of the various homomorphic attacks based on homomorphism nature of cryp...
The success of Garbage-man-in-the-middle (GMITM) attack relies on the possibility to access to the ...
Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryp...
Garbage-man-in-the-middle (type 2) attack is one of the various homomorphic attacks based on its hom...
This paper reports on a Lenstra’s attack against the Lucas based El-Gamal Cryptosystem in the ellipt...
This paper reports a security analysis on the Lucas Based El-Gamal Cryptosystem in the ...
Elliptic Curve Cryptography is a cryptography based on the algebraic structure of elliptic curves ov...
In this paper, a new cryptosystem will be developed which is analogue to ElGamal encryption scheme a...
The LUC4,6 cryptosystem is a system analogy with RSA cryptosystem and extended from LUC and LUC3 cry...
Cryptography is an evolving field that research into discreet mathematical equation that is represen...
Security of the information is the main problem in network communications nowadays. There is no algo...
To date, elliptic curves offer the most efficient cryptographic solution. Particularly efficient amo...
This paper introduces "hyper-and-elliptic-curve cryptography", in which a single high-security group...
International audienceIn 1995, Kuwakado, Koyama and Tsuruoka presented a new RSA-type scheme based o...
At the beginning the paper describes the basic properties of finite fieldarithmetic and elliptic cur...