Filters








397 Hits in 4.9 sec

Message recovery signature scheme using complementary elliptic curves

Teo Chun Yew, H.K. Haili, P. Sumari
2003 International Conference on Geometric Modeling and Graphics, 2003. Proceedings  
message recovery signature scheme using complementary curve.  ...  Earlier in [10] , we have showed a new method for imbedding plaintexts using complementary elliptic curve and now in this paper we will extend our work to obtain a new modified method for Nyberg-Rueppel  ...  A new Complementary elliptic Curve Signature Scheme Definition 4.1: A signature scheme provides message recovery if the message can be computed from the signature using only publicly known information.  ... 
doi:10.1109/gmag.2003.1219673 dblp:conf/gmp/YewKS03 fatcat:t2a753m3ivbfxcuvyojvvfdimi

A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V

2018 KSII Transactions on Internet and Information Systems  
The non-repudiation of simple messages and batch messages were included to further enhance the performance. 2) As compared to existing schemes, the proposed ESMAV scheme can greatly reduce the amount of  ...  LTE-V is a fast deployment technology that uses the legacy LTE network. However, one chipset, namely the LTE (telematics)/VDC (Vehicle Direct Communication), is used by all technologies.  ...  [21] proposed an authentication scheme for vehicular ad hoc networks (VANETs) using an elliptical curve-based signature, though it does not solve the non-repudiation of simple and batch messages.  ... 
doi:10.3837/tiis.2018.06.022 fatcat:puivptzhjnc2fh53pdklsoqmj4

Network Security in Cloud Computing with Elliptic Curve Cryptography

Victor O. Waziri, Ojeniyi J. Adebayo, Hakimi Danladi, Audu Isah, Abubakar S. Magaji, Muhammad Bashir Abdullahi
2013 Network and Communication Technologies  
This paper researches on cloud computing based-on authentication for the security verification using Elliptic Curve Digital Signature Algorithm (ECDSA).  ...  We reviewed various literatures on the elliptic curves and applied the cyclic elliptic curve group based-on finite field modulo q.  ...  The Cloud and the User can verify the transaction between them using the Elliptic Curve Digital Signature.  ... 
doi:10.5539/nct.v2n2p43 fatcat:lbnlusturndzhcawf6qcuxo3ae

KAuth: A Strong Single Sign-On Service based on PKI

Panayiotis Charalambous, Marios Karapetris, Elias Athanasopoulos
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
produced by an Elliptic Curve (EC) cryptosystem.  ...  In addition, Keybase offers us several features for identifying users in social networks and a login-to-Keybase process which is password-less, meaning that authentication takes place using digital signatures  ...  produced by an Elliptic Curve (EC) cryptosystem.  ... 
doi:10.5220/0006851906440649 dblp:conf/icete/CharalambousKA18 fatcat:p2zhdc5rpnbeherca3hmpmtfau

Securing RDS broadcast messages for smart grid applications

Monageng Kgwadi, Thomas Kunz
2011 International Journal of Autonomous and Adaptive Communications Systems  
Simulations are used to determine the impact on the network performance by employing digital signatures to allow source authentication.  ...  Beyond that, all the schemes have an effect on message reception due to increased message sizes and receiver bootstrapping for BiBa and HORSE.  ...  The flow of messages will follow the same diagram as depicted by Figure 6 The Elliptic Curve Digital Signature Algorithm Elliptic Curve Digital Signature Algorithm (ECDSA) is similar to the Digital  ... 
doi:10.1504/ijaacs.2011.043480 fatcat:l27lm6mo3jfr7e7p6sselvpwji

Securing RDS broadcast messages for smart grid applications

Monageng Kgwadi, Thomas Kunz
2010 Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ - IWCMC '10  
Simulations are used to determine the impact on the network performance by employing digital signatures to allow source authentication.  ...  Beyond that, all the schemes have an effect on message reception due to increased message sizes and receiver bootstrapping for BiBa and HORSE.  ...  The flow of messages will follow the same diagram as depicted by Figure 6 The Elliptic Curve Digital Signature Algorithm Elliptic Curve Digital Signature Algorithm (ECDSA) is similar to the Digital  ... 
doi:10.1145/1815396.1815666 dblp:conf/iwcmc/KgwadiK10 fatcat:d7husqma45gs7oegbqt472nc5y

On the importance of securing your bins

Marc Joye, Jean-Jacques Quisquater
1997 Proceedings of the 4th ACM conference on Computer and communications security - CCS '97  
In this paper, we address the following problem: " Is it possible to weaken/attack a scheme when a (provably) secure cryptosystem is used? ". The answer is yes.  ...  Moreover, it applies on many cryptosystems, including RSA, Rabin, LUC, KMOV, Demytko, ElGamal and its analogues, 3-pass system, knapsack scheme, etc. . . † φ denotes the Euler totient function, i.e. φ(  ...  Let m x be the message to be encrypted. This message will be represented by the point M = (m x , m y ) on the elliptic curve E n (a, b).  ... 
doi:10.1145/266420.266449 dblp:conf/ccs/JoyeQ97 fatcat:kbu2yiqstffyzmt3osgcr5bf2a

How to bypass the Wassenaar arrangement

Franck Leprévost, Raphaël Erard, Touradj Ebrahimi
2000 Proceedings of the 2000 ACM workshops on Multimedia - MULTIMEDIA '00  
As a consequence, we propose an original way to legally bypass the international export regulations using these technologies.  ...  This discussion is then followed by introducing the basic concepts of steganography and digital watermarking which could be used for secret communication.  ...  In the recovery process, the message is extracted from the cover data under use of the same secret key.  ... 
doi:10.1145/357744.357919 dblp:conf/mm/LeprevostEE00 fatcat:zrivb3huobfejkgkgs6aafa3k4

Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices

Harsh Durga Tiwari, Jae Hyung Kim
2018 ETRI Journal  
Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices.  ...  To develop a more secure and stable cryptography technique, we propose a new hybrid DNA-encoded ECC scheme that provides multilevel security.  ...  Basics of Elliptic Curve Cryptography To overcome the drawbacks of low speed, redundancy, and key size, ECC was proposed as an alternative to the established schemes such as the digital signature algorithm  ... 
doi:10.4218/etrij.2017-0220 fatcat:se4vxy7vhjbdlcvsdqjdiyfj5e

ESPR: Efficient Security Scheme for Position-Based Routing in Vehicular Ad Hoc Networks

Nizar Alsharif, Albert Wasef, Xuemin Shen
2010 2010 IEEE Global Telecommunications Conference GLOBECOM 2010  
ESPR considers both digital signature and keyed Hash Message Authentication Code (HMAC) to meet the unique requirements of PBR. In ESPR, all legitimate members share a secret key.  ...  In this study, we propose a novel security scheme called ESPR to secure PBR protocols in VANETs.  ...  Elliptic Curve Digital Signature Algorithm (ECDSA) [33] is considered where signature consists of two elliptic curve points.  ... 
doi:10.1109/glocom.2010.5684052 dblp:conf/globecom/AlsharifWS10 fatcat:kpjgknhghzduleziiys3ps4qfa

High Capacity Color Barcodes: Per Channel Data Encoding via Orientation Modulation in Elliptical Dot Arrays

O Bulan, G Sharma
2011 IEEE Transactions on Image Processing  
A reader recovers the barcode data from a conventional color scan of the barcode, using red, green, and blue (R,G,B) channels complementary, respectively, to the print C, M, and Y channels.  ...  In each colorant channel, payload data is conveyed by using a periodic array of elliptically shaped dots whose individual orientations are modulated to encode the data.  ...  A joint statistical channel model that captures the impact of the color interference in a sequential framework enables more effective decoding/recovery of barcode message data. (a) Data encoding.  ... 
doi:10.1109/tip.2010.2092437 pmid:21078575 fatcat:dquw2sja2rayzoxpcth46cvhu4

Noninteractive Self-Certification for Long-Lived Mobile Ad Hoc Networks

N. Saxena, Jeong Hyun Yi
2009 IEEE Transactions on Information Forensics and Security  
In this paper, we propose a power-aware and fully noninteractive self-certification protocol based on bi-variate polynomial secret sharing and a non-interactive threshold signature scheme.  ...  Elliptic Curves Our cryptographic protocol is based on the Discrete-Logarithm problems in Elliptic Curves (EC). We briefly review the underlying problems.  ...  For more details, we used the elliptic curve defined by the equation: Ý ¾ Ü ¿ ·½ over Ô with Ô ¿ a prime satisfying Ô ¾´ÑÓ µ ¿ and Õ being a prime factor 8 of Ô · ½.  ... 
doi:10.1109/tifs.2009.2031946 fatcat:obozgschzrfjnagflvf55obh4i

The Design and Implementation of Protocol-Based Hidden Key Recovery [chapter]

Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
2003 Lecture Notes in Computer Science  
than covert channels in encryption or signature algorithms.  ...  Using these designs, we present practical key recovery attacks on the SSL/TLS and SSH 2 protocols.  ...  Unlike previous key recovery or escrow schemes that work at the level of encryption and signature algorithms [23, 24] , our designs use features of the protocol.  ... 
doi:10.1007/10958513_13 fatcat:wxedbducqjcb3jqzudylhmldee

Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems [chapter]

Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf
2011 Lecture Notes in Computer Science  
Our new scheme is based on the so-called Unbalanced Oil and Vinegar class of MQ-schemes. We have derived our results mathematically and verified the speed-ups through a C++ implementation.  ...  In this paper, we show how post-quantum signature systems based on Multivariate Quadratic (MQ) polynomials can be improved up by about 9/10, and 3/5, respectively, in terms of public key size and verification  ...  We thank Ishtiaq Shah for doing the implementation of our scheme. Furthermore we want to thank our financial supporters.  ... 
doi:10.1007/978-3-642-23951-9_31 fatcat:jrr5mzsnrvfg5kig7jbxdmx5tm

EXT-TAURUM P2T: an Extended Secure CAN-FD Architecture for Road Vehicles [article]

Franco Oberti, Alessandro Savino, Ernesto Sanchez, Filippo Parisi, Stefano Di Carlo
2022 arXiv   pre-print
In this scenario, the Controller Area Network (CAN) is the most widely used communication protocol in the automotive domain. However, this protocol lacks encryption and authentication.  ...  P2T a new low-cost secure CAN-FD architecture for the automotive domain implementing secure communication among ECUs, a novel key provisioning strategy, intelligent throughput management, and hardware signature  ...  In particular, EXT-TAURUM P2T exploits Curve25519, an elliptic curve that offers state-of-the-art 128 security bits and is designed for use in the Elliptic Curve Diffie-Hellman (ECDH) key agreement design  ... 
arXiv:2112.08162v2 fatcat:difl3ihwrfcvbmgetn2s4indvm
« Previous Showing results 1 — 15 out of 397 results