Enhance key generation algorithm based user string identity as public key
This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a publ...
| Main Author: | Norhidayah, Muhammad |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/13065/ http://umpir.ump.edu.my/id/eprint/13065/19/Enhance%20key%20generation%20algorithm%20based%20user%20string%20identity%20as%20public%20key.pdf |
Similar Items
Enhancement of RSA Key Generation Using Identity
by: Norhidayah, Muhammad, et al.
Published: (2015)
by: Norhidayah, Muhammad, et al.
Published: (2015)
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013)
by: Norhidayah, Muhammad, et al.
Published: (2013)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009)
by: El-Orany, Faisal A.A, et al.
Published: (2009)
Security management in wireless sensor networks with a public key based scheme
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Securing U-Healthcare sensor networks using public key based scheme
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Strings
by: Soomro, Waseem Javaid, et al.
Published: (2011)
by: Soomro, Waseem Javaid, et al.
Published: (2011)
Fast Public-Key Cryptosystems: Design And Cryptanalyses
by: Go, Bok Min
Published: (2006)
by: Go, Bok Min
Published: (2006)
An enhanced tree-based key management scheme for secure communication in wireless sensor network
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
Key LogiQL Concepts
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
by: Mushtaq, Muhammad Faheem
Published: (2019)
by: Mushtaq, Muhammad Faheem
Published: (2019)
Methods of string class
by: Soomro, Waseem Javaid, et al.
Published: (2011)
by: Soomro, Waseem Javaid, et al.
Published: (2011)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Secure clustering in DSN with key predistribution and WCDS
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Securing wireless sensor networks with an efficient B+ tree-based key management scheme
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
S-PkSec: an asymmetric key based security management scheme for sensor network operation
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
A key-predistribution-based weakly connected dominating set for secure clustering in DSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Classification of key lime base on colour image processing
by: Rewathi, Karudan
Published: (2014)
by: Rewathi, Karudan
Published: (2014)
An analysis of a private-key cryptosystem / by Tan Wei-Wey.
by: Tan, Wei-Wey
Published: (2002)
by: Tan, Wei-Wey
Published: (2002)
An efficient LU decomposition-based key pre-distribution scheme for ensuring security in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
A key management scheme with encoding and improved security for wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Hand gesture based user interface system
by: Chin, Sui Yee
Published: (2013)
by: Chin, Sui Yee
Published: (2013)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
A resource-optimal key pre-distribution scheme with improved security for wireless sensor networks
by: Dai, Tran Thanh, et al.
Published: (2006)
by: Dai, Tran Thanh, et al.
Published: (2006)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Key Factors That Influence The Use Of Knowledge-Based Decision Support Systems In Medium-Sized Companies In Sudan
by: Mohamed Elshaiekh, Nour Eldin
Published: (2010)
by: Mohamed Elshaiekh, Nour Eldin
Published: (2010)
Pairwise Test Data Generation based on Flower Pollination Algorithm
by: Nasser, Abdullah B., et al.
Published: (2017)
by: Nasser, Abdullah B., et al.
Published: (2017)
Pattern of the strings of the n -th order limit language
by: Siti Hajar, Mohd Khairuddin, et al.
Published: (2024)
by: Siti Hajar, Mohd Khairuddin, et al.
Published: (2024)
Adopting Bees Algorithm for Sequenced Based T-Way Test Data Generation
by: Kamal Z., Zamli, et al.
Published: (2013)
by: Kamal Z., Zamli, et al.
Published: (2013)
Perceptions towards MySejahtera, e-Penjana: Identifying key factors
by: Lee, Chien Sing *, et al.
Published: (2021)
by: Lee, Chien Sing *, et al.
Published: (2021)
A parallel distributed Javaspaces implementation of RSA public key factorization using quadratic sieve / by Lau Khek Hooi.
by: Lau, Khek Hooi
Published: (2003)
by: Lau, Khek Hooi
Published: (2003)
Mobi parking navigator system (user dashboard module)
by: Mohd Na’imullah, Jamaludin
Published: (2013)
by: Mohd Na’imullah, Jamaludin
Published: (2013)
Similar Items
-
Enhancement of RSA Key Generation Using Identity
by: Norhidayah, Muhammad, et al.
Published: (2015) -
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013) -
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018) -
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008) -
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)