Trusted computing encryption model based on XTR public key cryptosystem

被引:0
|
作者
Zhou, Hua [1 ]
机构
[1] School of Electronic and Information, Guizhou University, Guiyang, China
来源
关键词
723.2 Data Processing and Image Processing - 921.1 Algebra;
D O I
10.12733/jcis14730
中图分类号
学科分类号
摘要
14
引用
收藏
页码:4465 / 4472
相关论文
共 50 条
  • [1] Side channel cryptanalysis on XTR public key cryptosystem
    Han, DG
    Izu, T
    Lim, J
    Sakurai, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (05): : 1214 - 1223
  • [2] XTR+:: A provable security public key cryptosystem
    Wang, Zehui
    Zhang, Zhiguo
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 534 - +
  • [3] XTR+:: A provable secure public key cryptosystem
    Wang Ze-hui
    Zhang Zhi-guo
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1359 - 1362
  • [4] A Secured Public Key Cryptosystem for Biometric Encryption
    Gobi, M.
    Kannan, D.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (01): : 49 - 57
  • [5] Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem
    Duan, Gangqiang
    Li, Shuai
    ELECTRONICS, 2023, 12 (18)
  • [6] New probabilistic public-key encryption based on the RSA cryptosystem
    Roman'kov, Vitalii A.
    GROUPS COMPLEXITY CRYPTOLOGY, 2015, 7 (02) : 153 - 156
  • [7] Broadcast encryption using identity-based public-key cryptosystem
    Lv, XX
    Yang, B
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 1092 - 1097
  • [8] An image encryption scheme based on public key cryptosystem and quantum logistic map
    Ye, Guodong
    Jiao, Kaixin
    Huang, Xiaoling
    Goi, Bok-Min
    Yap, Wun-She
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [9] An image encryption scheme based on public key cryptosystem and quantum logistic map
    Guodong Ye
    Kaixin Jiao
    Xiaoling Huang
    Bok-Min Goi
    Wun-She Yap
    Scientific Reports, 10
  • [10] Encryption key management as a trusted security as a service for cloud computing
    Fehis, Saad
    Nouali, Omar
    Kechadi, Mohand-Tahar
    International Journal of Security and Networks, 2021, 16 (03) : 150 - 162