# Discrete logarithm

Xem 1-14 trên 14 kết quả Discrete logarithm
• ### Developing digital signature schemes based on discrete logarithm problem

This paper proposes methods for developing digital signature scheme based on the difficulty of the discrete logarithm problem. From the establishment of overview scheme, some digital signature schema have been proposed for practical applications.

• ### On the Discrete Logarithm Problem on Algebraic Tori

Using a recent idea of Gaudry and exploiting rational repre-sentations of algebraic tori, we present an index calculus type a lgorithm for solving the discrete logarithm problem that works directly in these groups.

• ### ASYMETRIC-KEY CRYPTOGRAPHY

TRAPDOOR ONE-WAY FUNCTIONThe main idea behind asymmetric-key cryptography is the concept of the trapdoor one-way function. TrapdoorOne-WayFunction(TOWF) One-WayFunction(OWF) 1.fiseasytocompute. 2. f −1 is difficult to compute. 3. Given y and a trapdoor, x can be computed easily.

• ### Using Modern Symmetric Key Ciphers

USE OF MODERN BLOCK CIPHERS Symmetric-key encipherment can be done using modern block ciphers. Modes of operation have been devised to encipher text of any size employing either DES or AES. Error Propagation A single bit error in transmission can create errors in several in the corresponding block.

• ### Using Modern Symmetric unkey Ciphers

USE OF MODERN BLOCK CIPHERS Symmetric-key encipherment can be done using modern block ciphers. Modes of operation have been devised to encipher text of any size employing either DES or AES. 1 USE OF MODERN BLOCK CIPHERS Electronic codebook (ECB) mode Error Propagation A single bit error in transmission can create errors in several in the corresponding block. However, the error does not have any effect on the other blocks.

• ### MODERN CIPHERS FULL

How many padding bits must be added to a message of 100 characters if 8bit ASCII is used for encoding and the block cipher accepts blocks of 64 bits? Suppose that we have a block cipher where n = 64. If there are 10 1’s in the ciphertext, how many trialanderror tests does Eve need to do to recover the plaintext from the intercepted ciphertext in each of the following cases?

• ### MODERN CIPHERS

How many padding bits must be added to a message of 100 characters if 8-bit ASCII is used for encoding and the block cipher accepts blocks of 64 bits? 1 MODERN BLOCK CIPHERS Substitution or Transposition ? To be resistant to exhaustive-search attack, a modern block cipher needs to be designed as a substitution cipher. Suppose that we have a block cipher where n = 64. If there are 10 1’s in the ciphertext, how many trial-and-error tests does Eve need to do to recover the plaintext from the intercepted ciphertext in each of the following cases? a. The cipher is designed as a...

• ### Báo cáo " Mutual authentication between RFID tag and reader using Elliptic curve cryptography "

This paper presents an approach related to authenticate mutually a RFID (Radio Frequency Identification) tag from a RFID reader by using the cryptography based on Elliptic curve. Our proposal mutual authentication lies on the Elliptic curve discrete logarithm problem, which is considered the core in order to fight against all of attacks like replay attack, forgery attack and man-in-the-middle attack. Scientifically, we prove not only the accuracy and the security of our approach, but also its performance in the mutual authentication between a RFID tag and a reader. ...

• ### Elliptic Curve Cryptography

The paper discusses the implementation of ECC on two finite fields, prime field and binary field. It also gives an overview of ECC implementation on different coordinate systems called the projective coordinate systems.

• ### Elliptic Curve Cryptography An Implementation Guide

The paper gives an introduction to elliptic curve cryptography (ECC) and how it is used in the implementation of digital signature (ECDSA) and key agreement (ECDH) Algorithms. The paper discusses the implementation of ECC on two finite fields, prime field and binary field.

• ### The Elliptic Curve Digital Signature Algorithm (ECDSA)

The Digital Signature Algorithm (DSA) was speciﬁed in a U.S. Government Federal Information Processing Standard (FIPS) called the Digital Signature Standard (DSS [70]).

• ### A Mathematical Theory of Communication

THE recent development of various methods of modulation such as PCM and PPM which exchange bandwidth for signal-to-noise ratio has intensified the interest in a general theory of communication. A basis for such a theory is contained in the important papers of Nyquist1 and Hartley2 on this subject. In the present paper we will extend the theory to include a number of new factors, in particular the effect of noise in the channel, and the savings possible due to the statistical structure of the original message and due to the nature of the final destination of the information....

• ### Basic Mathematics for Economists - Rosser - Chapter 14

14 Exponential functions, continuous growth and differential equations Use the exponential function and natural logarithms to derive the ﬁnal sum, initial sum and growth rate when continuous growth takes place. Compare and contrast continuous and discrete growth rates.