Keyword: cryptography

Found 9 papers in total
Design of improved password authentication and update scheme based on elliptic curve cryptography
2013,
Secured password authentication and update of passwords are two essential requirements...
New attacks and security model of the secure flash disk
2013,
Nowadays, the secure flash disk is the most common secure mobile storage device. Two...
Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback
2013,
In 2002, Mita et al. proposed a pseudorandom bit generator based on a dynamic linear...
Adaptively secure identity‐based broadcast encryption with constant size private keys and ciphertexts from the subgroups
2012,
The main challenge in building efficient broadcast systems is to encrypt messages with...
Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography
2012,
We describe a new fault detection method in elliptic curve scalar multiplication...
Experimental Performance of Shared {RSA} Modulus Generation
2002,
Many distributed protocols require the participants to have secret shares of an RSA...
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems
2011,
Following in the spirit of data structure and algorithm correctness checking,...
Secure collaborative supply chain planning and inverse optimization – The JELS model
2011,
It is a well‐acknowledged fact that collaboration between different members of...
Secure collaborative supply chain planning and inverse optimization ‐ The JELS model
2011,
It is a well-acknowledged fact that collaboration between different members of a...
Papers per page: