Random key authentication scheme based on factoring integer and its applications

被引:0
|
作者
Chen, Qin
Ding, Hong
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications
    Safkhani, Masoumeh
    Bagheri, Nasour
    Kumari, Saru
    Tavakoli, Hamidreza
    Kumar, Sachin
    Chen, Jiahui
    IEEE ACCESS, 2020, 8 : 200851 - 200862
  • [2] A public key encryption scheme based on factoring and discrete logarithm
    Poulakis, Dimitrios
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2009, 12 (06): : 745 - 752
  • [3] Efficient Anonymous Authentication and Group Key Distribution Scheme Based on Quantum Random Numbers for VANETs
    Cheng, Teng
    Liu, Qiang
    Shi, Qin
    Yang, Ze
    Wang, Chuansu
    Zhang, Xing
    Xu, Peiling
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23544 - 23560
  • [4] A Featherweight Authentication and Key Agreement Scheme for Internet of Drones Applications
    Pu, Cong
    2023 IEEE 34TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PIMRC, 2023,
  • [5] Cryptanalysis of a key authentication scheme based on discrete logarithms
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    Kim, WH
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 72 - 76
  • [6] Key authentication scheme for cryptosystems based on discrete logarithms
    Horng, G
    Yang, CS
    COMPUTER COMMUNICATIONS, 1996, 19 (9-10) : 848 - 850
  • [7] A new key authentication scheme based on discrete logarithms
    Lee, CC
    Hwang, MS
    Li, LH
    APPLIED MATHEMATICS AND COMPUTATION, 2003, 139 (2-3) : 343 - 349
  • [8] Secure Key Authentication Scheme Based on Discrete Logarithms
    Yoon, Eun-Jun
    Yoo, Kee-Young
    NWESP 2007: THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2007, : 73 - +
  • [9] A provably secure delegated authentication scheme and its applications
    Lin, Qun
    Li, Jianzhong
    Ren, Xuechang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (02) : 139 - 146
  • [10] Integer wavelet transform based watermarking scheme for medical image authentication
    Dey, Ashis
    Chowdhuri, Partha
    Pal, Pabitra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (32) : 78001 - 78022