Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions.
Saurabh DuttaJ. K. MandalPublished in: AACC (2004)
Keyphrases
- private key
- public key
- digital signature
- encryption scheme
- security analysis
- public key cryptography
- smart card
- key management
- key distribution
- advanced encryption standard
- secret key
- secure communication
- secret sharing scheme
- security properties
- signature scheme
- ciphertext
- image encryption
- security protocols
- mutual authentication
- security model
- signcryption scheme
- standard model
- security mechanisms
- security requirements
- authentication protocol
- elliptic curve
- hash functions
- ad hoc networks
- proxy re encryption
- authentication scheme
- data integrity
- resource constrained
- provably secure
- lossless compression
- encryption algorithms
- distributed databases