Key escrow system for network environment based on RSA algorithm

被引:0
|
作者
Yang, Bo
Wang, Yumin
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:194 / 197
相关论文
共 50 条
  • [41] Homomorphism Key Agreement Based on RSA
    XIANG Guangli~ 1
    2. School of Computer
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1609 - 1612
  • [42] PROOF CHECKING THE RSA PUBLIC KEY ENCRYPTION ALGORITHM
    BOYER, RS
    MOORE, JS
    [J]. AMERICAN MATHEMATICAL MONTHLY, 1984, 91 (03): : 181 - 189
  • [43] An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
    Ye, Guodong
    Jiao, Kaixin
    Wu, Huishan
    Pan, Chen
    Huang, Xiaoling
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (15):
  • [44] Cryptanalysis of Boolean permutation-based key escrow scheme
    Concordia Institute for Information Systems Engineering, Concordia University, 1515 St. Catherine St. West, Ev7.638, Montreal, Que. H3G 1M8, Canada
    [J]. Comput Electr Eng, 1 (56-60):
  • [45] Cryptanalysis of Boolean permutation-based key escrow scheme
    Youssef, Amr M.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (01) : 56 - 60
  • [46] An Enhanced Parallel Version of RSA Public Key Crypto Based Algorithm Using OpenMP
    Saxena, Rahul
    Jain, Monika
    Singh, Dushyant
    Kushwah, Ashutosh
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 37 - 42
  • [47] A dynamic threshold commercial key escrow scheme based on conic
    Long, Y
    Cao, ZF
    Chen, KF
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 171 (02) : 972 - 982
  • [48] ON USING RSA WITH LOW EXPONENT IN A PUBLIC KEY NETWORK
    HASTAD, J
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 403 - 408
  • [49] Cryptoanalysis of RSA system of enciphering with public key
    Popovych, R
    [J]. MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2004, : 301 - 302
  • [50] A key escrow system with protecting user's privacy by blind decoding
    Sakurai, K
    Yamane, Y
    Miyazaki, S
    Inoue, T
    [J]. INFORMATION SECURITY, 1998, 1396 : 147 - 157