期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
二次整数环上的ElGamal密码体制和签名方案 被引量:1
1
作者 董学东 张妍 《计算机工程与应用》 CSCD 2013年第19期73-74,共2页
提出了二次数域的代数整数环上的ElGamal公钥密码体制和ElGamal签名方案,其安全性基于离散对数问题的困难性。
关键词 elgamal公钥密码 签名方案 代数整数环
在线阅读 下载PDF
基于四元整数的ElGamal公钥密码体制 被引量:2
2
作者 汪丽 邢伟 徐光忠 《计算机应用》 CSCD 北大核心 2008年第5期1156-1157,共2页
介绍了既约剩余类的概念以及四元整数的一些基本性质,提出了基于四元整数群的ElGamal公钥密码体制(PKC),其安全性基于大整数分解和离散对数问题的困难性,并在计算机上进行模拟实现,分析了其安全性。
关键词 E1Gamal公钥密码 剩余类 四元整数 模n既约四元整数同余类群
在线阅读 下载PDF
A NEW SCHEME BASED ON THE MI SCHEME AND ITS ANALYSIS 被引量:1
3
作者 Jiao Luyao Li Yifa Qiao Shuaiting 《Journal of Electronics(China)》 2013年第2期198-203,共6页
This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our ne... This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our new scheme, named the Multi-layer MI (MMI) scheme, has a structure of multi-layer central map. Firstly, this article introduces the MI scheme and describes linearization attack and differential attack; then prescribes the designation of MMI in detail, and proves that MMI can resist both linearization attack and differential attack. Besides, this article also proves that MMI can resist recent eXtended Linearization (XL)-like methods. In the end, this article concludes that MMI also maintains the efficiency of MI. 展开更多
关键词 Multivariate Quadratic (MQ) public-key cryptosystem (pkc) Matsumoto-Imai (MI) Central map Linearization attack Differential attack eXtended Linearization (XL)
在线阅读 下载PDF
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
4
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2010年第12期901-906,共6页
Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorit... Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorithm, for modular multiplicative inverse (MMI). Analysis of the proposed algorithm shows that it is more efficient than the Extended Euclid algorithm (XEA). In addition, if a MMI does not exist, then it is not necessary to use the Backtracking procedure in the proposed algorithm;this case requires fewer operations on every step (divisions, multiplications, additions, assignments and push operations on stack), than the XEA. Overall, XEA uses more multiplications, additions, assignments and twice as many variables than the proposed algorithm. 展开更多
关键词 Extended-Euclid ALGORITHM MODULAR MULTIPLICATIVE INVERSE public-key Cryptography RSA Cryptocol Rabin Information Hiding ALGORITHM elgamal ENCRYPTION/DECRYPTION NTRU cryptosystem Computer Simulation Low Memory Devices
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部