Discrete logarithm

Xem 1-14 trên 14 kết quả Discrete logarithm
  • This paper proposes methods for developing digital signature scheme based on the difficulty of the discrete logarithm problem. From the establishment of overview scheme, some digital signature schema have been proposed for practical applications.

    pdf8p luuhongdung 02-01-2016 10 1   Download

  • Using a recent idea of Gaudry and exploiting rational repre-sentations of algebraic tori, we present an index calculus type a lgorithm for solving the discrete logarithm problem that works directly in these groups.

    pdf20p dunglh2013 02-04-2014 24 3   Download

  • TRAPDOOR ONE-WAY FUNCTIONThe main idea behind asymmetric-key cryptography is the concept of the trapdoor one-way function. TrapdoorOne-WayFunction(TOWF) One-WayFunction(OWF) 1.fiseasytocompute. 2. f −1 is difficult to compute. 3. Given y and a trapdoor, x can be computed easily.

    pdf10p vovantien_2 05-12-2012 644 608   Download

  • USE OF MODERN BLOCK CIPHERS Symmetric-key encipherment can be done using modern block ciphers. Modes of operation have been devised to encipher text of any size employing either DES or AES. Error Propagation A single bit error in transmission can create errors in several in the corresponding block.

    ppt20p vovantien_2 05-12-2012 554 518   Download

  • USE OF MODERN BLOCK CIPHERS Symmetric-key encipherment can be done using modern block ciphers. Modes of operation have been devised to encipher text of any size employing either DES or AES. 1 USE OF MODERN BLOCK CIPHERS Electronic codebook (ECB) mode Error Propagation A single bit error in transmission can create errors in several in the corresponding block. However, the error does not have any effect on the other blocks.

    pdf10p vovantien_2 05-12-2012 77 43   Download

  • How many padding bits must be added to a message of 100 characters if 8bit ASCII is used for encoding and the block cipher accepts blocks of 64 bits? Suppose that we have a block cipher where n = 64. If there are 10 1’s in the ciphertext, how many trialanderror tests does Eve need to do to recover the plaintext from the intercepted ciphertext in each of the following cases?

    ppt24p vovantien_2 05-12-2012 30 5   Download

  • How many padding bits must be added to a message of 100 characters if 8-bit ASCII is used for encoding and the block cipher accepts blocks of 64 bits? 1 MODERN BLOCK CIPHERS Substitution or Transposition ? To be resistant to exhaustive-search attack, a modern block cipher needs to be designed as a substitution cipher. Suppose that we have a block cipher where n = 64. If there are 10 1’s in the ciphertext, how many trial-and-error tests does Eve need to do to recover the plaintext from the intercepted ciphertext in each of the following cases? a. The cipher is designed as a...

    pdf12p vovantien_2 05-12-2012 33 4   Download

  • This paper presents an approach related to authenticate mutually a RFID (Radio Frequency Identification) tag from a RFID reader by using the cryptography based on Elliptic curve. Our proposal mutual authentication lies on the Elliptic curve discrete logarithm problem, which is considered the core in order to fight against all of attacks like replay attack, forgery attack and man-in-the-middle attack. Scientifically, we prove not only the accuracy and the security of our approach, but also its performance in the mutual authentication between a RFID tag and a reader. ...

    pdf8p tuanlocmuido 13-12-2012 15 2   Download

  • The paper discusses the implementation of ECC on two finite fields, prime field and binary field. It also gives an overview of ECC implementation on different coordinate systems called the projective coordinate systems.

    pdf11p dunglh2013 02-04-2014 24 1   Download

  • The paper gives an introduction to elliptic curve cryptography (ECC) and how it is used in the implementation of digital signature (ECDSA) and key agreement (ECDH) Algorithms. The paper discusses the implementation of ECC on two finite fields, prime field and binary field.

    pdf11p dunglh2013 02-04-2014 14 0   Download

  • The Digital Signature Algorithm (DSA) was specified in a U.S. Government Federal Information Processing Standard (FIPS) called the Digital Signature Standard (DSS [70]).

    pdf56p dunglh2013 02-04-2014 21 0   Download

  • THE recent development of various methods of modulation such as PCM and PPM which exchange bandwidth for signal-to-noise ratio has intensified the interest in a general theory of communication. A basis for such a theory is contained in the important papers of Nyquist1 and Hartley2 on this subject. In the present paper we will extend the theory to include a number of new factors, in particular the effect of noise in the channel, and the savings possible due to the statistical structure of the original message and due to the nature of the final destination of the information....

    pdf55p toad_prince9x 30-09-2011 47 16   Download

  • 14 Exponential functions, continuous growth and differential equations Use the exponential function and natural logarithms to derive the final sum, initial sum and growth rate when continuous growth takes place. Compare and contrast continuous and discrete growth rates.

    pdf33p thegun16 26-11-2010 36 6   Download

  • Topological Hochschild homology and localization 2. The homotopy groups of T (A|K) 3. The de Rham-Witt complex and TR· (A|K; p) ∗ 4. Tate cohomology and the Tate spectrum 5. The Tate spectral sequence for T (A|K) 6. The pro-system TR· (A|K; p, Z/pv ) ∗ Appendix A. Truncated polynomial algebras References Introduction In this paper we establish a connection between the Quillen K-theory of certain local fields and the de Rham-Witt complex of their rings of integers with logarithmic poles at the maximal ideal.

    pdf114p tuanloccuoi 04-01-2013 19 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản