Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   4  
      Provable SecuritySigncryptionRandom Oracle ModelAuthenticated Encryption
    • by 
    •   6  
      CryptographyProvable SecurityLineDigital Signatures
Electronic commerce, as exemplified by the popularity of the Internet, is becoming more important along with fast progress in communications and information technology. The SET (Secure Electronic Transaction) protocol is a scheme designed... more
    • by  and +1
    •   2  
      SigncryptionElliptic Curve Cryptography
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
    • by 
    •   5  
      Computer ScienceCryptographyECCComputer Applications
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and... more
    • by 
    •   7  
      Digital SignatureEncryptionOutsider ArtSigncryption
Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have to signcrypt a single message to a certain receiver.... more
    • by 
    •   4  
      CryptanalysisProvable SecuritySigncryptionRandom Oracle Model
    • by 
    •   3  
      ECCSigncryptionIJMER
Electronic commerce, as exemplified by the popularity of the Internet, is becoming more important along with fast progress in communications and information technology. The SET (Secure Electronic Transaction) protocol is a scheme designed... more
    • by 
    •   3  
      SigncryptionElliptic Curve CryptographySET Protocol
The certificate-based cryptosystems is traditional way in providing the system parameters. Identity-based cryptography is more efficient than certificate-based cryptosystems. Each user in identity-based cryptography uses any arbitrary... more
    • by 
    •   5  
      Security RequirementsSigncryptionECDLPIdentity Based Cryptography
Hyper elliptical curve cryptography is the prominent public key encrypto systems with practical approach to high level of security and shorter bit size of encryption. Public key encryption is a reliable cryptographic method for mobile... more
    • by 
    •   7  
      SecurityManetSigncryptionKey escrow
    • by 
    •   5  
      PrivacyInvisibleKeySigncryption
    • by 
    •   5  
      Public Key InfrastructureCryptanalysisProvable SecuritySigncryption
    • by 
    •   6  
      CryptographyEncryptionHash FunctionsChaos
A key encapsulation mechanism (KEM) that takes as input an arbitrary string, i.e., a tag, is known as tag-KEM, while a scheme that combines signature and encryption is called signcryption. In this paper, we present a code-based... more
    • by 
    •   5  
      MathematicsComputer ScienceEncryptionSigncryption
    • by 
    •   7  
      Computer ScienceSecurityThe Internet of ThingsInternet of Things (IoT)
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
    • by 
    •   5  
      Computer ScienceCryptographyECCComputer Applications
Most of the existing hierarchical secret-sharing schemes are unconditionally (non-cryptographically) secured, and they cannot survive from various types of attacks especially when the participants use resource-constrained wireless mobile... more
    • by 
    •   4  
      Distributed ComputingSecurity CommunicationSigncryptionElliptic Curve Cryptography
    • by 
    •   56  
      Information SystemsDistributed ComputingSystem IdentificationSemantics
In this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has... more
    • by  and +1
    •   4  
      SecurityThe Internet of ThingsSigncryptionRandom Oracle Model Proof
This article proposes a hybrid certificateless signcryption scheme that is secure against adaptive chosen ciphertext adversary in the random oracle model. The scheme combines an asymmetric encryption which is one way against chosen... more
    • by 
    •   5  
      Computer ScienceDistributed ComputingSigncryptionElectrical And Electronic Engineering
An Identity-based cryptosystem is a Public Key cryptosystem in which the public keys of the entities are their identities, or strings derived from their identities. Signcryption combines digital signatures and encryption with a cost... more
    • by 
    •   7  
      Computer ScienceDigital SignatureSigncryptionSignature
Mobile communication and Mobile Commerce is most famous nowadays as a result of the administration offered amid the portability. In any case, notwithstanding of its new headways, versatile correspondence has been confronting numerous... more
    • by 
    •   7  
      Information SecurityMobile CommerceComputer SecurityCryptography
... Dr Faisal Bashir Computer Science Dept College of Telecommunication Engineering (MCS) Rawalpindi, Pakistan faisalbashir@mcs.edu.pk Dr Asif Masood Computer Science Dept College of Telecommunication Engineering (MCS) Rawalpindi,... more
    • by 
    •   11  
      Computer SciencePrivacyComputer SecurityCryptography
    • by 
    •   13  
      PrivacyComputer NetworksCryptographyMobile Communication
    • by 
    •   4  
      SecurityThe Internet of ThingsSigncryptionRandom Oracle Model Proof
    • by 
    •   3  
      Cloud ComputingElliptic curvesSigncryption