An implementation of a new public key system based on RSA which leads hackers solve multiple hard problems to break the cipher.
P. S. RasmiPaul VarghesePublished in: ISDA (2012)
Keyphrases
- public key
- hard problems
- encryption scheme
- public key cryptography
- security analysis
- digital signature
- ciphertext
- private key
- signature scheme
- elliptic curve cryptography
- security model
- secret key
- image authentication
- diffie hellman
- provably secure
- authentication scheme
- authentication protocol
- phase transition
- image encryption
- simulated annealing
- public key encryption
- key exchange
- key distribution
- rfid tags