CO5630049A1 - Uso de isogenos para el diseño de criptosistemas - Google Patents
Uso de isogenos para el diseño de criptosistemasInfo
- Publication number
- CO5630049A1 CO5630049A1 CO04094973A CO04094973A CO5630049A1 CO 5630049 A1 CO5630049 A1 CO 5630049A1 CO 04094973 A CO04094973 A CO 04094973A CO 04094973 A CO04094973 A CO 04094973A CO 5630049 A1 CO5630049 A1 CO 5630049A1
- Authority
- CO
- Colombia
- Prior art keywords
- isogen
- generation
- cited
- key corresponding
- encryption
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3257—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Computational Mathematics (AREA)
- Mathematical Physics (AREA)
- General Engineering & Computer Science (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
- Dental Preparations (AREA)
- Glass Compositions (AREA)
- Mobile Radio Communication Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
- Complex Calculations (AREA)
- Developing Agents For Electrophotography (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
- Transition And Organic Metals Composition Catalysts For Addition Polymerization (AREA)
Abstract
Un método comprende:generando un isógeno que traza una pluralidad de puntos desde una primera curva elíptica hacia una segunda curva elíptica;publicando una clave pública que corresponde al isógeno;encriptando un mensaje que usa una clave de encriptación que corresponde al isógeno; yque descifra el mensaje encriptado que usa una clave de descencriptación correspondiendo al isógeno. Un método como el citado por la reivindicación 1 , en qué por lo menos una clave de encriptación o de descencriptación es una clave privada, la clave privada siendo un isógeno dual del isógeno. Un método como el citado por la reivindicación 1, en donde el isógeno se genera usando una técnica seleccionada de un grupo que comprende una generación múltiple compleja, una generación modular, una generación linealmente independiente, y combinaciones de ellas. SOLICITUDES DE PATENTES DE MODELO DE UTILIDADORDENADAS PUBLICAR EN MARZO DE 2006 IMPORTANTE:SOLICITUDES DE PATENTE DE MODELO DE UTILIDAD: A partir de la fecha de publicación de esta gaceta el solicitante cuenta con un plazo de tres (3) meses para pedir que se practique el examen de patentabilidad de la solicitud, anexando el recibo de pago de la tasa correspondiente a tal fin. De no procederse así la solicitud caerá en abandono (Arts. 85 y 44 de la Decisión 486).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US51714203P | 2003-11-03 | 2003-11-03 | |
US10/816,083 US7499544B2 (en) | 2003-11-03 | 2004-03-31 | Use of isogenies for design of cryptosystems |
Publications (1)
Publication Number | Publication Date |
---|---|
CO5630049A1 true CO5630049A1 (es) | 2006-04-28 |
Family
ID=34426337
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CO04094973A CO5630049A1 (es) | 2003-11-03 | 2004-09-23 | Uso de isogenos para el diseño de criptosistemas |
Country Status (20)
Country | Link |
---|---|
US (1) | US7499544B2 (es) |
EP (1) | EP1528705B1 (es) |
JP (1) | JP4809598B2 (es) |
KR (1) | KR101098701B1 (es) |
CN (1) | CN100583755C (es) |
AT (1) | ATE429098T1 (es) |
AU (1) | AU2004218638B2 (es) |
BR (1) | BRPI0404122A (es) |
CA (1) | CA2483486C (es) |
CO (1) | CO5630049A1 (es) |
DE (1) | DE602004020565D1 (es) |
HK (1) | HK1085585A1 (es) |
IL (1) | IL164071A0 (es) |
MX (1) | MXPA04010155A (es) |
MY (1) | MY165770A (es) |
NO (1) | NO20044028L (es) |
NZ (1) | NZ535698A (es) |
RU (1) | RU2376651C2 (es) |
SG (1) | SG111191A1 (es) |
TW (1) | TWI360990B (es) |
Families Citing this family (61)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4842276B2 (ja) * | 2004-11-11 | 2011-12-21 | サーティコム コーポレーション | 楕円曲線上の新しいトラップドア1方向性関数と、その、より短い署名及び非対称暗号化への応用 |
US7594261B2 (en) * | 2005-02-08 | 2009-09-22 | Microsoft Corporation | Cryptographic applications of the Cartier pairing |
US7702098B2 (en) | 2005-03-15 | 2010-04-20 | Microsoft Corporation | Elliptic curve point octupling for weighted projective coordinates |
US7680268B2 (en) | 2005-03-15 | 2010-03-16 | Microsoft Corporation | Elliptic curve point octupling using single instruction multiple data processing |
US7617397B2 (en) * | 2005-04-29 | 2009-11-10 | Microsoft Corporation | Systems and methods for generation and validation of isogeny-based signatures |
JP4575251B2 (ja) * | 2005-07-25 | 2010-11-04 | 株式会社東芝 | デジタル署名生成装置、デジタル署名検証装置、デジタル署名生成方法、デジタル署名検証方法、デジタル署名生成プログラム及びデジタル署名検証プログラム |
CN1980123B (zh) * | 2005-11-30 | 2010-07-21 | 中国科学院研究生院 | 基于ibe的pki系统的实现方法及其密钥管理装置 |
US8180047B2 (en) * | 2006-01-13 | 2012-05-15 | Microsoft Corporation | Trapdoor pairings |
WO2008156107A1 (ja) | 2007-06-18 | 2008-12-24 | Nec Corporation | 電子データの暗号化及び暗号化データ復号化システム及びその方法 |
KR101490687B1 (ko) * | 2007-08-20 | 2015-02-06 | 삼성전자주식회사 | 홈 네트워크에서 디바이스들이 비밀 정보를 공유하는 방법및 이를 위한 장치 |
CN101925942B (zh) * | 2008-02-20 | 2013-11-27 | 三菱电机株式会社 | 验证装置 |
US8037327B2 (en) * | 2008-03-31 | 2011-10-11 | Agilent Technologies, Inc. | System and method for improving dynamic response in a power supply |
WO2010024401A1 (ja) * | 2008-08-29 | 2010-03-04 | 国立大学法人岡山大学 | ペアリング演算装置、ペアリング演算方法、及びペアリング演算プログラム |
US8250367B2 (en) * | 2008-09-30 | 2012-08-21 | Microsoft Corporation | Cryptographic applications of efficiently evaluating large degree isogenies |
US20100100947A1 (en) * | 2008-10-21 | 2010-04-22 | Apple Inc. | Scheme for authenticating without password exchange |
JP5268066B2 (ja) * | 2009-01-16 | 2013-08-21 | 日本電信電話株式会社 | 変換演算装置、その方法、プログラム及び記録媒体 |
US8510558B2 (en) * | 2009-02-17 | 2013-08-13 | Alcatel Lucent | Identity based authenticated key agreement protocol |
CN101800640B (zh) * | 2009-11-10 | 2012-09-05 | 浙江工业大学 | 基于Web Service的IBE密钥管理系统 |
US8634563B2 (en) | 2010-12-17 | 2014-01-21 | Microsoft Corporation | Attribute based encryption using lattices |
JP5693206B2 (ja) * | 2010-12-22 | 2015-04-01 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム |
RU2494553C2 (ru) * | 2011-05-03 | 2013-09-27 | ЗАО Институт инфокоммуникационных технологий | Способ защиты информации |
RU2450457C1 (ru) * | 2011-05-20 | 2012-05-10 | Государственное образовательное учреждение высшего профессионального образования Марийский государственный технический университет | Способ шифрования |
WO2013116916A1 (en) * | 2012-02-09 | 2013-08-15 | Irdeto Canada Corporation | System and method for generating and protecting cryptographic keys |
US10148285B1 (en) | 2012-07-25 | 2018-12-04 | Erich Schmitt | Abstraction and de-abstraction of a digital data stream |
CN104348614B (zh) * | 2013-07-24 | 2019-02-01 | 腾讯科技(深圳)有限公司 | 身份合法性验证的方法、装置及服务器 |
RU2541938C1 (ru) * | 2013-11-20 | 2015-02-20 | федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский государственный политехнический университет" (ФГАОУ ВО "СПбПУ") | Способ шифрования с защитой от квантовых атак на основе циклов функций вебера |
US10795858B1 (en) | 2014-02-18 | 2020-10-06 | Erich Schmitt | Universal abstraction and de-abstraction of a digital data stream |
US20230125560A1 (en) * | 2015-12-20 | 2023-04-27 | Peter Lablans | Cryptographic Computer Machines with Novel Switching Devices |
JP6614979B2 (ja) * | 2016-01-15 | 2019-12-04 | 三菱電機株式会社 | 暗号装置、暗号方法及び暗号プログラム |
ES2680851T3 (es) | 2016-02-23 | 2018-09-11 | nChain Holdings Limited | Registro y método de gestión automática para contratos inteligentes ejecutados por cadena de bloques |
US11606219B2 (en) | 2016-02-23 | 2023-03-14 | Nchain Licensing Ag | System and method for controlling asset-related actions via a block chain |
CN117611331A (zh) | 2016-02-23 | 2024-02-27 | 区块链控股有限公司 | 用于使用区块链在点对点分布式账簿上有效转移实体的方法及系统 |
AU2017222421B2 (en) * | 2016-02-23 | 2022-09-01 | nChain Holdings Limited | Personal device security using elliptic curve cryptography for secret sharing |
BR112018016821A2 (pt) | 2016-02-23 | 2018-12-26 | Nchain Holdings Ltd | sistema e métodos implementados por computador |
AU2017223133B2 (en) | 2016-02-23 | 2022-09-08 | nChain Holdings Limited | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
JP6925346B2 (ja) | 2016-02-23 | 2021-08-25 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | ブロックチェーンベースのトークナイゼーションを用いた交換 |
SG10202007904SA (en) | 2016-02-23 | 2020-10-29 | Nchain Holdings Ltd | A method and system for securing computer software using a distributed hash table and a blockchain |
GB2561729A (en) | 2016-02-23 | 2018-10-24 | Nchain Holdings Ltd | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
JP6833861B2 (ja) | 2016-02-23 | 2021-02-24 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | ブロックチェーンシステム内におけるフィードバックを統合したエージェントベースチューリング完全なトランザクション |
KR20180115768A (ko) | 2016-02-23 | 2018-10-23 | 엔체인 홀딩스 리미티드 | 블록체인으로부터 데이터의 안전한 추출을 위한 암호화 방법 및 시스템 |
CN105915520B (zh) * | 2016-04-18 | 2019-02-12 | 深圳大学 | 基于公钥可搜索加密的文件存储、搜索方法及存储系统 |
JP2017212699A (ja) * | 2016-05-27 | 2017-11-30 | 三菱電機株式会社 | 暗号化装置、復号装置及び暗号システム |
US10673631B2 (en) * | 2016-11-07 | 2020-06-02 | Infosec Global Inc. | Elliptic curve isogeny-based cryptographic scheme |
EP3367608A1 (en) * | 2017-02-28 | 2018-08-29 | Koninklijke Philips N.V. | Elliptic curve isogeny based key agreement protocol |
EP3379766B1 (en) * | 2017-03-20 | 2019-06-26 | Huawei Technologies Co., Ltd. | A wireless communication device for communication in a wireless communication network |
US11146397B2 (en) * | 2017-10-31 | 2021-10-12 | Micro Focus Llc | Encoding abelian variety-based ciphertext with metadata |
CN108536651B (zh) * | 2018-04-19 | 2022-04-05 | 武汉轻工大学 | 生成可逆模m矩阵的方法和装置 |
WO2019208484A1 (ja) * | 2018-04-25 | 2019-10-31 | 日本電信電話株式会社 | 秘密集約総和システム、秘密計算装置、秘密集約総和方法、およびプログラム |
CN112805769B (zh) * | 2018-10-04 | 2023-11-07 | 日本电信电话株式会社 | 秘密s型函数计算系统、装置、方法及记录介质 |
KR102184189B1 (ko) * | 2018-11-19 | 2020-11-27 | 주식회사 엔에스에이치씨 | 꼬인 에드워즈 곡선에 대한 4차 아이소제니 계산 방법 |
KR102184188B1 (ko) * | 2018-11-19 | 2020-11-27 | 주식회사 엔에스에이치씨 | 꼬인 에드워즈 곡선에 대한 3차 아이소제니 계산 방법 |
US11764940B2 (en) | 2019-01-10 | 2023-09-19 | Duality Technologies, Inc. | Secure search of secret data in a semi-trusted environment using homomorphic encryption |
US11032074B2 (en) * | 2019-02-11 | 2021-06-08 | Pqsecure Technologies, Llc | Cryptosystem and method using isogeny-based computations to reduce a memory footprint |
US11128454B2 (en) | 2019-05-30 | 2021-09-21 | Bong Mann Kim | Quantum safe cryptography and advanced encryption and key exchange (AEKE) method for symmetric key encryption/exchange |
US10880278B1 (en) * | 2019-10-03 | 2020-12-29 | ISARA Corporation | Broadcasting in supersingular isogeny-based cryptosystems |
US11509473B2 (en) | 2020-07-20 | 2022-11-22 | Pqsecure Technologies, Llc | Architecture and method for hybrid isogeny-based cryptosystems |
WO2022250656A1 (en) * | 2021-05-25 | 2022-12-01 | Pqsecure Technologies, Llc | An efficient and scalable architecture and method for isogeny-based cryptosystems |
CN113254985B (zh) * | 2021-07-15 | 2021-12-21 | 北京信安世纪科技股份有限公司 | 数据加密方法、数据处理方法、数据解密方法及电子设备 |
WO2023287427A1 (en) * | 2021-07-16 | 2023-01-19 | Pqsecure Technologies, Llc | A method and system for computing large-degree isogenies with an odd degree |
WO2023055582A1 (en) * | 2021-09-30 | 2023-04-06 | Visa International Service Association | Round optimal oblivious transfers from isogenies |
EP4311161A1 (en) * | 2022-07-18 | 2024-01-24 | GMV Soluciones Globales Internet, S.A.U. | Method and entity for generating a private key in an identity-based cryptosystem without key escrow |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0233239A (ja) * | 1988-07-23 | 1990-02-02 | Nintendo Co Ltd | 通信制御装置 |
US5497423A (en) | 1993-06-18 | 1996-03-05 | Matsushita Electric Industrial Co., Ltd. | Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication |
WO1999030458A1 (en) | 1997-12-05 | 1999-06-17 | Secured Information Technology, Inc. | Transformation methods for optimizing elliptic curve cryptographic computations |
US6212277B1 (en) | 1998-03-05 | 2001-04-03 | Matsushita Electric Industrial Co., Ltd. | Elliptic curve transformation device, utilization device and utilization system |
EP1112637A1 (en) | 1998-09-08 | 2001-07-04 | Citibank, N.A. | Elliptic curve cryptosystems for low memory devices |
CA2321246A1 (en) | 1999-09-08 | 2001-03-08 | Hitachi, Ltd. | Method and apparatus for generating elliptic curve, elliptic curve cryptosystem and recording medium |
US7113594B2 (en) * | 2001-08-13 | 2006-09-26 | The Board Of Trustees Of The Leland Stanford University | Systems and methods for identity-based encryption and related cryptographic techniques |
US7209555B2 (en) * | 2001-10-25 | 2007-04-24 | Matsushita Electric Industrial Co., Ltd. | Elliptic curve converting device, elliptic curve converting method, elliptic curve utilization device and elliptic curve generating device |
CA2369545C (en) | 2001-12-31 | 2013-01-08 | Certicom Corp. | Method and apparatus for elliptic curve scalar multiplication |
-
2004
- 2004-03-31 US US10/816,083 patent/US7499544B2/en active Active
- 2004-08-10 EP EP04018957A patent/EP1528705B1/en not_active Expired - Lifetime
- 2004-08-10 DE DE602004020565T patent/DE602004020565D1/de not_active Expired - Lifetime
- 2004-08-10 AT AT04018957T patent/ATE429098T1/de not_active IP Right Cessation
- 2004-08-10 SG SG200404557A patent/SG111191A1/en unknown
- 2004-08-27 CN CN200410068590A patent/CN100583755C/zh not_active Expired - Lifetime
- 2004-09-10 TW TW093127553A patent/TWI360990B/zh not_active IP Right Cessation
- 2004-09-13 KR KR1020040073118A patent/KR101098701B1/ko active IP Right Grant
- 2004-09-14 IL IL16407104A patent/IL164071A0/xx unknown
- 2004-09-20 BR BR0404122-4A patent/BRPI0404122A/pt not_active IP Right Cessation
- 2004-09-23 CO CO04094973A patent/CO5630049A1/es not_active Application Discontinuation
- 2004-09-24 NO NO20044028A patent/NO20044028L/no unknown
- 2004-10-01 JP JP2004290612A patent/JP4809598B2/ja not_active Expired - Fee Related
- 2004-10-01 CA CA2483486A patent/CA2483486C/en not_active Expired - Fee Related
- 2004-10-01 MY MYPI20044024A patent/MY165770A/en unknown
- 2004-10-01 NZ NZ535698A patent/NZ535698A/en not_active IP Right Cessation
- 2004-10-06 AU AU2004218638A patent/AU2004218638B2/en not_active Ceased
- 2004-10-15 MX MXPA04010155A patent/MXPA04010155A/es active IP Right Grant
- 2004-11-02 RU RU2004132057/09A patent/RU2376651C2/ru not_active IP Right Cessation
-
2005
- 2005-09-22 HK HK05108290.5A patent/HK1085585A1/xx not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
MXPA04010155A (es) | 2005-05-17 |
CN100583755C (zh) | 2010-01-20 |
DE602004020565D1 (de) | 2009-05-28 |
IL164071A0 (en) | 2005-12-18 |
EP1528705B1 (en) | 2009-04-15 |
HK1085585A1 (en) | 2006-08-25 |
EP1528705A1 (en) | 2005-05-04 |
US20050094806A1 (en) | 2005-05-05 |
KR20050042441A (ko) | 2005-05-09 |
RU2376651C2 (ru) | 2009-12-20 |
MY165770A (en) | 2018-04-23 |
JP4809598B2 (ja) | 2011-11-09 |
ATE429098T1 (de) | 2009-05-15 |
BRPI0404122A (pt) | 2005-06-21 |
CA2483486A1 (en) | 2005-05-03 |
AU2004218638A1 (en) | 2005-05-19 |
SG111191A1 (en) | 2005-05-30 |
JP2005141200A (ja) | 2005-06-02 |
RU2004132057A (ru) | 2006-04-10 |
US7499544B2 (en) | 2009-03-03 |
KR101098701B1 (ko) | 2011-12-23 |
CN1614922A (zh) | 2005-05-11 |
AU2004218638B2 (en) | 2009-07-30 |
TW200525979A (en) | 2005-08-01 |
TWI360990B (en) | 2012-03-21 |
CA2483486C (en) | 2013-12-24 |
NZ535698A (en) | 2006-02-24 |
NO20044028L (no) | 2005-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CO5630049A1 (es) | Uso de isogenos para el diseño de criptosistemas | |
Singh et al. | A performance analysis of DES and RSA cryptography | |
BR112014007061A2 (pt) | sistema criptográfico, método de geração de uma chave secreta de usuário para utilização em um sistema criptográfico com base em atributo hierárquico, método de descriptografia de um ciphertext para utilização em um sistema criptográfico com base em atributo hierárquico, método de criptografia de uma mensagem para utilização em um sistema criptográfico com base em atributo hierárquico, e, programa de computador | |
WO2008148784A3 (fr) | Procedes et dispositifs cryptographiques de generation pseudo-aleatoire de chiffrement de donnees et de hachage cryptographique d'un message | |
ATE523017T1 (de) | Schlüsselvereinbarungs- und transportprotokoll | |
BR0316473A (pt) | Método para gerar um código de fluxo utilizando múltiplas chaves | |
Hales | The NSA back door to NIST | |
Großschädl | TinySA: A security architecture for wireless sensor networks | |
AU2003272087A1 (en) | A method of elliptic curve encryption | |
AR031413A1 (es) | Certificado de transacciones. | |
Krishna et al. | Cubic spline curve public key cryptography | |
JP2023063201A (ja) | Qap型準同型暗号における公開鍵システムの設計方法 | |
Daza et al. | On dynamic distribution of private keys over MANETs | |
Schipor | On the security of Jhanwar-Barua identity-based encryption scheme | |
Ariffin et al. | AA β public key cryptosystem-A comparative analysis against RSA and ECC | |
JP3894919B2 (ja) | 電子署名方法とそのプログラム及び装置 | |
Hecht | PQC: R-Propping of a Simple Oblivious Transfer | |
JP4914377B2 (ja) | 署名生成装置、署名検証装置、署名生成検証システム、それらの方法及びプログラム | |
Mittal et al. | Understanding integer-based fully homomorphic encryption | |
KR102496583B1 (ko) | 암호화 장치 및 이를 이용한 암호화 방법 | |
Mahad et al. | AA β public key cryptosystem-A new practical asymmetric implementation based on the square root problem | |
KR20230041402A (ko) | 암호화 장치 및 이를 이용한 암호화 방법 | |
Susilo et al. | On the Security of the Identity-based Encryption based on DHIES from ASIACCS 2010 | |
KR20230041403A (ko) | 암호화 장치 및 이를 이용한 암호화 방법 | |
Andalib et al. | The RSA algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FC | Application refused |