[PDF][PDF] A note on tame polynomial automorphisms and the security of TTM cryptosystem
In this paper we discuss two basic ways of TTM cryptosystem modifications. We suggest to
add one more polynomial transformation into the coding process, and we discuss the …
add one more polynomial transformation into the coding process, and we discuss the …
CST: P2P anonymous authentication system based on collaboration signature
X Wang, X Sun, G Sun, D Luo - 2010 5th International …, 2010 - ieeexplore.ieee.org
Anonymity has received increasing attention in the literature due to the users' awareness of
their privacy nowadays. While anonymity related issues have been extensively studied in …
their privacy nowadays. While anonymity related issues have been extensively studied in …
Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem
R Rastaghi - arXiv preprint arXiv:1302.2112, 2013 - arxiv.org
Akleylek et al.[S. Akleylek, L. Emmungil and U. Nuriyev, A mod ified algorithm for peer-to-
peer security, journal of Appl. Comput. Math., vol. 6 (2), pp. 258-264, 2007.], introduced a …
peer security, journal of Appl. Comput. Math., vol. 6 (2), pp. 258-264, 2007.], introduced a …
Una arquitectura distribuida para la detección, comunicación y mitigación de la denegación de servicio
L Campo Giralte - 2014 - burjcdigital.urjc.es
Como bien se sabe, en la actualidad los ciberataques tienen lugar en cualquier lugar del
mundo y afectan a todo tipo de infraestructuras. Todos los meses se reciben noticias de …
mundo y afectan a todo tipo de infraestructuras. Todos los meses se reciben noticias de …
[PDF][PDF] Sharing of Encrypted Information in a Network Using Block Cipher Cryptography
M Ojha, P Dubey - International Journal of Emerging Technology and …, 2013 - Citeseer
In this Paper we are proposing a theoretical cum practical model that predicts the
performance of the system and computes the values of the technique parameters that …
performance of the system and computes the values of the technique parameters that …
[PDF][PDF] Hybrid Public Key Encryption Scheme for Networking
SJ Aboud - Advances in Computational Research, 2013 - academia.edu
In this paper, we analyze the Akleylek, et al. scheme and their try to enhance a security of
peer-to-peer network by merging El-Gamal scheme with knapsack system. We demonstrate …
peer-to-peer network by merging El-Gamal scheme with knapsack system. We demonstrate …
[引用][C] Exchange of Encrypted Information Using Block Cipher Cryptography
PK Agnihotri, P Gautam