๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Public-key encryption chip


Publisher
Elsevier Science
Year
1986
Tongue
English
Weight
145 KB
Volume
9
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


On using primes for public key encryptio
โœ E.Dennis Huthnance; Joe Warndof ๐Ÿ“‚ Article ๐Ÿ“… 1988 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 221 KB

It is shown that the popular RSA public key encryption scheme does not require two primes but that probable primes may be used instead. A method for finding probable primes is given and the security of systems based on probable primes is discussed.

Reversible data mixing procedure for eff
โœ Mike Matyas; Mohammad Peyravian; Allen Roginsky; Nev Zunic ๐Ÿ“‚ Article ๐Ÿ“… 1998 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 754 KB

This paper describes a datd mixmg method for encrypting a plaintext block using a block encryption algorithm (such as Elliptic Curve, RSA, etc.) having a block size smaller than that of the plaintext block. The process of encrypting a plaintext block consists of first mixing the plaintext block and

Key management of the double random-phas
โœ Nirmala Saini; Aloka Sinha ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 603 KB

Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the

On the concealability of messages by the
โœ S. Kothari; S. Lakshmivarahan ๐Ÿ“‚ Article ๐Ÿ“… 1984 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 665 KB

A (plaintext) message is said to be unconcealable if the encrypted message is the same as the original plaintext message. An analysis of the Williams public-key encryption scheme from the point of view of (un) concealability of messages is presented.

Dynamic and efficient joint encryption s
โœ Zuhua Shao ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 204 KB

In this paper, we propose a joint encryption scheme (JES) based on discrete logarithms in the plain public key model, in which a sender can easily encrypt messages under the public keys of a group of recipients, so that only by collaborating together can all the recipients recover messages. Neither