A Note on the Computation of the Modular Inverse for Cryptography

M Bufalo, D Bufalo, G Orlando - Axioms, 2021 - mdpi.com
In literature, there are a number of cryptographic algorithms (RSA, ElGamal, NTRU, etc.) that
require multiple computations of modulo multiplicative inverses. In this paper, we describe …

A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications

V Kumar, R Kumar, SK Pandey - International Journal of …, 2020 - Wiley Online Library
In today's Internet era, group communications have become more and more essential for
many emerging applications. Given the openness of today's networks, efficient and secure …

LKM-AMI: a lightweight key management scheme for secure two way communications between smart meters and HAN devices of AMI system in smart grid

V Kumar, R Kumar, SK Pandey - Peer-to-Peer Networking and …, 2021 - Springer
Smart Grid (SG) is a modernized power grid. Nowadays changing the power grid system into
a smart grid is revolution and evolution. Owing to the widespread use of wireless …

Some Properties of the Computation of the Modular Inverse with Applications in Cryptography

M Bufalo, D Bufalo, G Orlando - Computation, 2023 - mdpi.com
In the field of cryptography, many algorithms rely on the computation of modular
multiplicative inverses to ensure the security of their systems. In this study, we build upon our …

[PDF][PDF] 基于区块链的粮食防伪溯源系统的设计与实现

王莉, 任健荣, 王涛, 牛群峰, 惠延波, 桂冉冉 - 科学技术与工程, 2023 - stae.com.cn
摘要针对粮食溯源系统的安全问题, 传统的中心化存储数据在各企业之间存在着信任问题,
消费者在进行溯源查询时同时存在着安全问题. 以大米为研究对象, 构建粮食供应链溯源模型 …

A computationally efficient and scalable key management scheme for access control of media delivery in digital pay-TV systems

V Kumar, R Kumar, SK Pandey - Multimedia Tools and Applications, 2021 - Springer
In today's Internet era, group communications in multimedia applications are becoming more
and more popular. The issues of controlling illegal access to multimedia contents require …

An efficient and scalable distributed key management scheme using ternary tree for secure communication in dynamic groups

V Kumar, R Kumar, SK Pandey - … of ICETIT 2019: Emerging Trends in …, 2019 - Springer
The problem of controlling unauthorized access to group communication requires secure
distribution and maintenance of group key. In this paper, we present, implement and analyze …

Impact of group theory in cryptosystem

P Singh, M Khari, NS Kaundanya - Functional encryption, 2021 - Springer
This paper presents a new approach of group theory toward cryptosystem with its
application of mathematical methods and functions for cryptographic regions. This new …

Key management scheme for secure group communication

O Pal, B Alam - Advances in Data and Information Sciences …, 2020 - Springer
Multicast or group communication enables the distribution of the content in a one-to-many
fashion. In multicast communication, the major challenges are dynamicity of group, forward …

Discrete Logarithmic Improvement for ElGamal Cryptosystem Using Matrix Concepts

S Irawadi - 2020 8th International Conference on Cyber and …, 2020 - ieeexplore.ieee.org
The ElGamal cryptosystem is an asymmetric cryptosystem that works on abelian groups of
integers. This study examines the improvement of the discrete logarithm of the matrix in the …