54 Hits in 7.1 sec

Improvement of Menezes-Vanstone Elliptic Curve Cryptosystem Based on Quadratic Bézier Curve Technique

Dua M. Ghadi, Adil AL-Rammahi
2020 Journal of Computer Science  
In this study a new method is introduced using the Menezes-Vanstone Elliptic Curve Cryptosystem (MVECC) for data based on quadratic Bézier curve techniques.  ...  The most important system in cryptography is public key cryptography and the mostly used is the elliptic curves cryptosystem, because of it is very efficient and secure and difficult to solve the discrete  ...  Acknowledgment This paper was supported by the faculty of Computer Science and Mathematics, Department of Mathematics of University of Kufa, Iraq.  ... 
doi:10.3844/jcssp.2020.715.722 fatcat:yrfyib3d7jdkbetvmg5mir2hty

Implementation of Text Encryption using Elliptic Curve Cryptography

Laiphrakpam Dolendro Singh, Khumanthem Manglem Singh
2015 Procedia Computer Science  
Elliptic Curve Cryptography has been a recent research area in the field of Cryptography. It provides higher level of security with lesser key size compared to other Cryptographic techniques.  ...  The algorithm is designed in such a way that it can be used to encrypt or decrypt any type of script with defined ASCII values.  ...  Darrel Hankerson, Alfred Menezes and Scott Vanstone wrote a book called Guide to Elliptic Curve Cryptography and it provide various details of elliptic curve arithmetic, cryptographic protocols and implementation  ... 
doi:10.1016/j.procs.2015.06.009 fatcat:xp573eii4bbyln2pkw4e2nd75q

A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution

Sura Abed Sarab Hussien, Thair Abed Sarab Hussien, Mustafa Abdulsatar Noori
2021 Iraqi Journal of Science  
The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies.  ...  The experimental results, using a PSNR within average of 65 and MSE within average of 85, indicate that the proposed method has proven successful in its ability to efficiently embedding data.  ...  0) , (14, 6) , (14, 23) , (18, 2) , (18, 27) Menezes-Vanstone Elliptic Curve Cryptosystem (MVECC) MVECC system introduced by Menezes and Vanstone in 1993.  ... 
doi:10.24996/ijs.2021.62.9.37 fatcat:zevdjjawlbb2tppjvp6wjlmtjm

Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem

Zeyu Liu, Tiecheng Xia, Jinbo Wang
2018 Discrete Dynamics in Nature and Society  
On the application side, we apply the proposed discrete fractional map into image encryption with the secret keys ciphered by Menezes-Vanstone Elliptic Curve Cryptosystem (MVECC).  ...  We observe the bifurcation behaviors and draw the bifurcation diagrams, the largest Lyapunov exponent plot, and the phase portraits of the proposed map, respectively.  ...  Acknowledgments The project was supported by the National Natural Science Foundation of China (Grant nos. 61072147, 11271008).  ... 
doi:10.1155/2018/4585083 fatcat:5au6s7g3uzcjnnu7obmiw7yuyq

SPDH - A Secure Plain Diffie-Hellman Algorithm

Henrik Tange, Birger Andersen
2012 Journal of Cyber Security and Mobility  
Other algorithms as for instance ECMQV (Elliptic Curve Menezes Qo Vanstone) can handle this problem but is far more complex and slower because the algorithm is a three-pass algorithm whereas the Diffie–Hellman  ...  Secure communication in a wireless system or end-to-end communication requires setup of a shared secret. This shared secret can be obtained by the use of a public key cryptography system.  ...  The ECMQV Algorithm The Man-in-the-Middle problem can be solved with a three-pass protocol as for instance the ECMQV (Elliptic Curve Menezes Qo Vanstone) algorithm.  ... 
doi:10.13052/jcsm2245-1439.1231 fatcat:pulps7p2zjhfdjhmtyvj2ekivq

Security Analysis with respect to Wireless Sensor Network – Review

K.Sethu Selvam, Dr.S.P. Rajagopalan
2017 International Journal Of Engineering And Computer Science  
In this paper, analysis of various security attacks and security techniques of WSN was done.  ...  Wireless Sensor Network (WSN) is operated remotely and can be used in various fields like military surveillance, environmental monitoring, traffic monitoring, health monitoring and etc.  ...  [15] proposed technique which is combination of Genetic Algorithm and new cryptography scheme based on Elliptic Curve Cryptography(ECC).  ... 
doi:10.18535/ijecs/v6i4.46 fatcat:6qzcuk6efzdddfvt2xi4wnx2ey

Computational Image Encryption Techniques: A Comprehensive Review

Mandeep Kaur, Surender Singh, Manjit Kaur, Erivelton Geraldo Nepomuceno
2021 Mathematical Problems in Engineering  
To achieve this objective, encryption is one of the best methods among the information hiding methods. In recent years, many image encryption approaches are designed by the researchers.  ...  They use different concepts for image encryption to increase security. The main aim of this paper is to present a comprehensive review of the existing image encryption approaches.  ...  [49] designed a Menezes-Vanstone elliptic curve cryptosystem.  ... 
doi:10.1155/2021/5012496 fatcat:oidlu6wptveyphresdjape2gya

Comparing the MOV and FR Reductions in Elliptic Curve Cryptography [chapter]

Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai
1999 Lecture Notes in Computer Science  
the detail of the FR reduction and to implement it for actual elliptic curves with nite elds on a practical scale; and based on them compare the (extended) MOV and FR reductions from an algorithmic point  ...  This paper addresses the discrete logarithm problem in elliptic curve cryptography.  ...  Introduction This paper addresses the discrete logarithm problem (DLP) in elliptic curve (EC) cryptography. ECs have been intensively studied in algebraic geometry and number theory.  ... 
doi:10.1007/3-540-48910-x_14 fatcat:2qmegmtkxrddlftuozksckpt3e

A Group Law on the Projective Plane with Applications in Public Key Cryptography

Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué
2020 Mathematics  
We present an experimental setup in order to show real computation times along a comparison with the group operation in the group of points of an elliptic curve.  ...  Based on current state-of-the-art algorithms, we provide parameter ranges suitable for real world applications.  ...  In order to overcome these limitations, Menezes and Vanstone proposed in [8] the Elliptic Curve Menezes-Vanstone cryptosystem (ECMV) for elliptic curves over finite fields F q .  ... 
doi:10.3390/math8050734 fatcat:y5ywbaforbghllbbuwgcjxaucu

The Magic of Elliptic Curves and Public-Key Cryptography

Florian Heß, Andreas Stein, Sandra Stein, Manfred Lochter
2012 Jahresbericht der Deutschen Mathematiker-Vereinigung (Teubner)  
In 1985, Koblitz and Miller independently proposed to use elliptic curves in cryptography which can only be described as a magnificent and practical application of elliptic curves.  ...  This paper intends to mostly present a low-brow introduction of elliptic curves and their use in real-world applications of public-key cryptography. Andreas  ...  Acknowledgements The authors wish to thank several colleagues for carefully proofreading several versions of this paper.  ... 
doi:10.1365/s13291-012-0038-y fatcat:nbtar75ngzbf5f7v44xw7bqiay

Performance Analysis of Cloud-based Health Care Data Privacy System Using Hybrid Techniques

C. Sapna Kumari, C. N. Asha, U. Rajashekhar, K. Viswanath
2022 International Journal of Biology and Biomedical Engineering  
Using original and decrypted data, various performance factors are calculated in terms of execution time, packet delivery ratio, throughput, latency and compare these results with conventional methods  ...  Security level depends on the size of a symmetric key which is employed for encryption and decryption using various cryptography systems management and in modern approaches like block and RF codes including  ...  In the ECC model, the novel approaches presented for data encipher-texting are Menezes Vanstone.  ... 
doi:10.46300/91011.2022.16.7 fatcat:klxggoxf6zc3zi72qvvoxpa2ba

Group theory in cryptography [article]

Simon R. Blackburn, Carlos Cid, Ciaran Mullan
2010 arXiv   pre-print
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory.  ...  The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers in the area.  ...  For readers who insist on falling into the mathematical pit mentioned above, the book by Washington [90] on cryptography using elliptic curves is an excellent follow-up read; elliptic curve based cryptography  ... 
arXiv:0906.5545v2 fatcat:hos33mtpa5fshh2rd6nkoyj4tq

A Survey of Public-Key Cryptosystems

Neal Koblitz, Alfred J. Menezes
2004 SIAM Review  
We give an overview of the most important public-key cryptosystems and discuss the difficult task of evaluating the merit of such systems.  ...  See Hankerson, Menezes and Vanstone [49] for an extensive coverage of implementation aspects of elliptic curve cryptography. P = (x 1 , y 1 ) Q = (x 2 , y 2 ) (a) Addition: P + Q = R.  ...  Comprehensive books on cryptography include those by Menezes, van Oorschot and Vanstone [84] , Stinson [116] , and Mao [78] .  ... 
doi:10.1137/s0036144503439190 fatcat:wix7yrhdnzaslooaugb5ttrt7y

Efficient Computation for Pairing Based Cryptography: A State of the Art [chapter]

Nadia El
2013 Theory and Practice of Cryptography and Network Security Protocols and Technologies  
A first use of such maps concerns cryptanalysis and was proposed in1993 by Menezes Okamoto and Vanstone [53] and in 1994 by G. Frey and H.G.  ...  The elliptic curve used in pairing based cryptography are constructed throught the complex multiplication method.  ... 
doi:10.5772/56295 fatcat:fy654p2onzd7tgcbqi4fbasunu

A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography

Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu, Shouliang Li
2021 Applied Sciences  
Based on the elliptic curve cryptography (ECC), we proposed a public key image encryption method where the hash value derived from the plain image was encrypted by ECC.  ...  Second, for different planes, the corresponding method of block partition was followed by the rule that the higher the bit plane, the smaller the size of the partitioned block as a basic unit for permutation  ...  Subsequently, Menezes et al. [27] discussed the elliptic curve cryptosystems and their implementation, which leads to the Menezes-Vanstone cryptosystem.  ... 
doi:10.3390/app11125691 fatcat:c4glihi5wrallpv62bwcnjuszi
« Previous Showing results 1 — 15 out of 54 results