DIFFIE-HELLMAN

作品数:103被引量:306H指数:10
导出分析报告
相关领域:自动化与计算机技术电子电信更多>>
相关作者:张建中王彩芬张玉磊杨波潘春兰更多>>
相关机构:陕西师范大学西北师范大学甘肃卫生职业学院中国科学院更多>>
相关期刊:更多>>
相关基金:国家自然科学基金陕西省自然科学基金国家重点基础研究发展计划中央高校基本科研业务费专项资金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=International Journal of Communications, Network and System Sciencex
条 记 录,以下是1-4
视图:
排序:
Faster Method for Secure Transmission of Information with Sender Identification
《International Journal of Communications, Network and System Sciences》2013年第2期77-81,共5页Boris Verkhovsky 
This paper describes an algorithm for secure transmission of information via open communication channels based on the discrete logarithm problem. The proposed algorithm also provides sender identification (digital sig...
关键词:Digital Signature RSA Algorithm DIFFIE-HELLMAN Key Exchange ELGAMAL Cryptosystem ENCRYPTOR Discrete LOGARITHM SENDER IDENTIFICATION Multiplicative Inverse 
Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design
《International Journal of Communications, Network and System Sciences》2012年第11期715-719,共5页Boris Verkhovsky 
Primitive elements play important roles in the Diffie-Hellman protocol for establishment of secret communication keys, in the design of the ElGamal cryptographic system and as generators of pseudo-random numbers. In g...
关键词:DIFFIE-HELLMAN Key Exchange ELGAMAL CRYPTOSYSTEM GENERATOR GENERATOR of PSEUDO-RANDOM Numbers Information Hiding Primitive Element Safe Prime 
TUP: A New eCK-Secure AKE Protocol under the CDH Assumption
《International Journal of Communications, Network and System Sciences》2012年第6期332-336,共5页Qinglei Zhou Zengfu Yang 
The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for ...
关键词:Authenticated Key Exchange Provable Security eCK Model Computational DIFFIE-HELLMAN ASSUMPTION TRAPDOOR Test 
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography被引量:1
《International Journal of Communications, Network and System Sciences》2010年第4期369-379,共11页Krishnan Kumar J. Nafeesa Begum V. Sumathy 
This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group...
关键词:Ad HOC Network Region-Based GROUP Key AGREEMENT Protocol ELLIPTIC CURVE DIFFIE-HELLMAN Tree-Based GROUP ELLIPTIC CURVE DIFFIE-HELLMAN 
检索报告 对象比较 聚类工具 使用帮助 返回顶部