A Note on the Computation of the Modular Inverse for Cryptography
M Bufalo, D Bufalo, G Orlando - Axioms, 2021 - mdpi.com
In literature, there are a number of cryptographic algorithms (RSA, ElGamal, NTRU, etc.) that
require multiple computations of modulo multiplicative inverses. In this paper, we describe …
require multiple computations of modulo multiplicative inverses. In this paper, we describe …
A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications
In today's Internet era, group communications have become more and more essential for
many emerging applications. Given the openness of today's networks, efficient and secure …
many emerging applications. Given the openness of today's networks, efficient and secure …
LKM-AMI: a lightweight key management scheme for secure two way communications between smart meters and HAN devices of AMI system in smart grid
Smart Grid (SG) is a modernized power grid. Nowadays changing the power grid system into
a smart grid is revolution and evolution. Owing to the widespread use of wireless …
a smart grid is revolution and evolution. Owing to the widespread use of wireless …
Some Properties of the Computation of the Modular Inverse with Applications in Cryptography
M Bufalo, D Bufalo, G Orlando - Computation, 2023 - mdpi.com
In the field of cryptography, many algorithms rely on the computation of modular
multiplicative inverses to ensure the security of their systems. In this study, we build upon our …
multiplicative inverses to ensure the security of their systems. In this study, we build upon our …
[PDF][PDF] 基于区块链的粮食防伪溯源系统的设计与实现
王莉, 任健荣, 王涛, 牛群峰, 惠延波, 桂冉冉 - 科学技术与工程, 2023 - stae.com.cn
摘要针对粮食溯源系统的安全问题, 传统的中心化存储数据在各企业之间存在着信任问题,
消费者在进行溯源查询时同时存在着安全问题. 以大米为研究对象, 构建粮食供应链溯源模型 …
消费者在进行溯源查询时同时存在着安全问题. 以大米为研究对象, 构建粮食供应链溯源模型 …
A computationally efficient and scalable key management scheme for access control of media delivery in digital pay-TV systems
In today's Internet era, group communications in multimedia applications are becoming more
and more popular. The issues of controlling illegal access to multimedia contents require …
and more popular. The issues of controlling illegal access to multimedia contents require …
An efficient and scalable distributed key management scheme using ternary tree for secure communication in dynamic groups
The problem of controlling unauthorized access to group communication requires secure
distribution and maintenance of group key. In this paper, we present, implement and analyze …
distribution and maintenance of group key. In this paper, we present, implement and analyze …
Key management scheme for secure group communication
Multicast or group communication enables the distribution of the content in a one-to-many
fashion. In multicast communication, the major challenges are dynamicity of group, forward …
fashion. In multicast communication, the major challenges are dynamicity of group, forward …
Discrete Logarithmic Improvement for ElGamal Cryptosystem Using Matrix Concepts
S Irawadi - 2020 8th International Conference on Cyber and …, 2020 - ieeexplore.ieee.org
The ElGamal cryptosystem is an asymmetric cryptosystem that works on abelian groups of
integers. This study examines the improvement of the discrete logarithm of the matrix in the …
integers. This study examines the improvement of the discrete logarithm of the matrix in the …