A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Message recovery signature scheme using complementary elliptic curves
2003 International Conference on Geometric Modeling and Graphics, 2003. Proceedings
message recovery signature scheme using complementary curve. ...
Earlier in [10] , we have showed a new method for imbedding plaintexts using complementary elliptic curve and now in this paper we will extend our work to obtain a new modified method for Nyberg-Rueppel ...
A new Complementary elliptic Curve Signature Scheme Definition 4.1: A signature scheme provides message recovery if the message can be computed from the signature using only publicly known information. ...
doi:10.1109/gmag.2003.1219673
dblp:conf/gmp/YewKS03
fatcat:t2a753m3ivbfxcuvyojvvfdimi
A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V
2018
KSII Transactions on Internet and Information Systems
The non-repudiation of simple messages and batch messages were included to further enhance the performance. 2) As compared to existing schemes, the proposed ESMAV scheme can greatly reduce the amount of ...
LTE-V is a fast deployment technology that uses the legacy LTE network. However, one chipset, namely the LTE (telematics)/VDC (Vehicle Direct Communication), is used by all technologies. ...
[21] proposed an authentication scheme for vehicular ad hoc networks (VANETs) using an elliptical curve-based signature, though it does not solve the non-repudiation of simple and batch messages. ...
doi:10.3837/tiis.2018.06.022
fatcat:puivptzhjnc2fh53pdklsoqmj4
Network Security in Cloud Computing with Elliptic Curve Cryptography
2013
Network and Communication Technologies
This paper researches on cloud computing based-on authentication for the security verification using Elliptic Curve Digital Signature Algorithm (ECDSA). ...
We reviewed various literatures on the elliptic curves and applied the cyclic elliptic curve group based-on finite field modulo q. ...
The Cloud and the User can verify the transaction between them using the Elliptic Curve Digital Signature. ...
doi:10.5539/nct.v2n2p43
fatcat:lbnlusturndzhcawf6qcuxo3ae
KAuth: A Strong Single Sign-On Service based on PKI
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications
produced by an Elliptic Curve (EC) cryptosystem. ...
In addition, Keybase offers us several features for identifying users in social networks and a login-to-Keybase process which is password-less, meaning that authentication takes place using digital signatures ...
produced by an Elliptic Curve (EC) cryptosystem. ...
doi:10.5220/0006851906440649
dblp:conf/icete/CharalambousKA18
fatcat:p2zhdc5rpnbeherca3hmpmtfau
Securing RDS broadcast messages for smart grid applications
2011
International Journal of Autonomous and Adaptive Communications Systems
Simulations are used to determine the impact on the network performance by employing digital signatures to allow source authentication. ...
Beyond that, all the schemes have an effect on message reception due to increased message sizes and receiver bootstrapping for BiBa and HORSE. ...
The flow of messages will follow the same diagram as depicted by Figure 6
The Elliptic Curve Digital Signature Algorithm Elliptic Curve Digital Signature Algorithm (ECDSA) is similar to the Digital ...
doi:10.1504/ijaacs.2011.043480
fatcat:l27lm6mo3jfr7e7p6sselvpwji
Securing RDS broadcast messages for smart grid applications
2010
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ - IWCMC '10
Simulations are used to determine the impact on the network performance by employing digital signatures to allow source authentication. ...
Beyond that, all the schemes have an effect on message reception due to increased message sizes and receiver bootstrapping for BiBa and HORSE. ...
The flow of messages will follow the same diagram as depicted by Figure 6
The Elliptic Curve Digital Signature Algorithm Elliptic Curve Digital Signature Algorithm (ECDSA) is similar to the Digital ...
doi:10.1145/1815396.1815666
dblp:conf/iwcmc/KgwadiK10
fatcat:d7husqma45gs7oegbqt472nc5y
On the importance of securing your bins
1997
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
In this paper, we address the following problem: " Is it possible to weaken/attack a scheme when a (provably) secure cryptosystem is used? ". The answer is yes. ...
Moreover, it applies on many cryptosystems, including RSA, Rabin, LUC, KMOV, Demytko, ElGamal and its analogues, 3-pass system, knapsack scheme, etc. . . † φ denotes the Euler totient function, i.e. φ( ...
Let m x be the message to be encrypted. This message will be represented by the point M = (m x , m y ) on the elliptic curve E n (a, b). ...
doi:10.1145/266420.266449
dblp:conf/ccs/JoyeQ97
fatcat:kbu2yiqstffyzmt3osgcr5bf2a
How to bypass the Wassenaar arrangement
2000
Proceedings of the 2000 ACM workshops on Multimedia - MULTIMEDIA '00
As a consequence, we propose an original way to legally bypass the international export regulations using these technologies. ...
This discussion is then followed by introducing the basic concepts of steganography and digital watermarking which could be used for secret communication. ...
In the recovery process, the message is extracted from the cover data under use of the same secret key. ...
doi:10.1145/357744.357919
dblp:conf/mm/LeprevostEE00
fatcat:zrivb3huobfejkgkgs6aafa3k4
Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices
2018
ETRI Journal
Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. ...
To develop a more secure and stable cryptography technique, we propose a new hybrid DNA-encoded ECC scheme that provides multilevel security. ...
Basics of Elliptic Curve Cryptography To overcome the drawbacks of low speed, redundancy, and key size, ECC was proposed as an alternative to the established schemes such as the digital signature algorithm ...
doi:10.4218/etrij.2017-0220
fatcat:se4vxy7vhjbdlcvsdqjdiyfj5e
ESPR: Efficient Security Scheme for Position-Based Routing in Vehicular Ad Hoc Networks
2010
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
ESPR considers both digital signature and keyed Hash Message Authentication Code (HMAC) to meet the unique requirements of PBR. In ESPR, all legitimate members share a secret key. ...
In this study, we propose a novel security scheme called ESPR to secure PBR protocols in VANETs. ...
Elliptic Curve Digital Signature Algorithm (ECDSA) [33] is considered
where signature consists of two elliptic curve points. ...
doi:10.1109/glocom.2010.5684052
dblp:conf/globecom/AlsharifWS10
fatcat:kpjgknhghzduleziiys3ps4qfa
High Capacity Color Barcodes: Per Channel Data Encoding via Orientation Modulation in Elliptical Dot Arrays
2011
IEEE Transactions on Image Processing
A reader recovers the barcode data from a conventional color scan of the barcode, using red, green, and blue (R,G,B) channels complementary, respectively, to the print C, M, and Y channels. ...
In each colorant channel, payload data is conveyed by using a periodic array of elliptically shaped dots whose individual orientations are modulated to encode the data. ...
A joint statistical channel model that captures the impact of the color interference in a sequential framework enables more effective decoding/recovery of barcode message data. (a) Data encoding. ...
doi:10.1109/tip.2010.2092437
pmid:21078575
fatcat:dquw2sja2rayzoxpcth46cvhu4
Noninteractive Self-Certification for Long-Lived Mobile Ad Hoc Networks
2009
IEEE Transactions on Information Forensics and Security
In this paper, we propose a power-aware and fully noninteractive self-certification protocol based on bi-variate polynomial secret sharing and a non-interactive threshold signature scheme. ...
Elliptic Curves Our cryptographic protocol is based on the Discrete-Logarithm problems in Elliptic Curves (EC). We briefly review the underlying problems. ...
For more details, we used the elliptic curve defined by the equation: Ý ¾ Ü ¿ ·½ over Ô with Ô ¿ a prime satisfying Ô ¾´ÑÓ µ ¿ and Õ being a prime factor 8 of Ô · ½. ...
doi:10.1109/tifs.2009.2031946
fatcat:obozgschzrfjnagflvf55obh4i
The Design and Implementation of Protocol-Based Hidden Key Recovery
[chapter]
2003
Lecture Notes in Computer Science
than covert channels in encryption or signature algorithms. ...
Using these designs, we present practical key recovery attacks on the SSL/TLS and SSH 2 protocols. ...
Unlike previous key recovery or escrow schemes that work at the level of encryption and signature algorithms [23, 24] , our designs use features of the protocol. ...
doi:10.1007/10958513_13
fatcat:wxedbducqjcb3jqzudylhmldee
Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems
[chapter]
2011
Lecture Notes in Computer Science
Our new scheme is based on the so-called Unbalanced Oil and Vinegar class of MQ-schemes. We have derived our results mathematically and verified the speed-ups through a C++ implementation. ...
In this paper, we show how post-quantum signature systems based on Multivariate Quadratic (MQ) polynomials can be improved up by about 9/10, and 3/5, respectively, in terms of public key size and verification ...
We thank Ishtiaq Shah for doing the implementation of our scheme. Furthermore we want to thank our financial supporters. ...
doi:10.1007/978-3-642-23951-9_31
fatcat:jrr5mzsnrvfg5kig7jbxdmx5tm
EXT-TAURUM P2T: an Extended Secure CAN-FD Architecture for Road Vehicles
[article]
2022
arXiv
pre-print
In this scenario, the Controller Area Network (CAN) is the most widely used communication protocol in the automotive domain. However, this protocol lacks encryption and authentication. ...
P2T a new low-cost secure CAN-FD architecture for the automotive domain implementing secure communication among ECUs, a novel key provisioning strategy, intelligent throughput management, and hardware signature ...
In particular, EXT-TAURUM P2T exploits Curve25519, an elliptic curve that offers state-of-the-art 128 security bits and is designed for use in the Elliptic Curve Diffie-Hellman (ECDH) key agreement design ...
arXiv:2112.08162v2
fatcat:difl3ihwrfcvbmgetn2s4indvm
« Previous
Showing results 1 — 15 out of 397 results