Rabin cryptography algorithm is an asymmetric algorithm. The advantage of this algorithm is a simple encryption process so that it can reduce processing time, even though the used resource is limited. Encryption process in the Rabin algorithm causes enlargement of the data size, moreover, the ...
difficult (for p,q are two large prime numbers), the Rabin-OAEP is secure against adaptive algorithm chosen-ciphertext attack.” Result proves claim that Rabin-OAEP is an security algorithm. Key wor ds public-key cryptography; Rabin-OAEP algorithm; adaptive chosen-ciphertext attack ...
关键词:二次剩余定理;Rabin密码体制;图像分存;信息安全 中图分类号:TP309 文献标识码:A ImageSharingImprovementAlgorithm BasedonRabinCryptosystem ZHUANG Zhi (CollegeofManagement,ChongqingJiaotongUniversity,Chongqing400074) Abstract:ImageSharingisanimportantmeasuretoprotecttheimage.Byanalyzingthequadraticresiduetheorem...
probabilistic algorithm pseudoprimes Access this article Log in via an institution Subscribe and save Springer+ Basic €32.70 /Month Get 10 units per month Download Article/Chapter or eBook 1 Unit = 1 Article or 1 Chapter Cancel anytime Subscribe now Buy Now Buy article PDF 39,95 € Pr...
In this article, we use the features of the Rabin public key cryptography algorithm, which verifies that the signature process requires only low-cost square multiplication and modulo operations. Based on this, an RFID security authentication protocol with Rabin encryption algorithm is designed. The ...
In our proposed system, a benefit of the illusions messages has been took where was consider as a weakness point in Rabin crypto algorithm due to size problem, and we turned to advantages in steganography field which will used not only constructing hiding map but also authenticated mechanism ...
In this study, the authors performed cryptocompression, which was a merger of the H-Rabin cryptographic algorithms and the Golomb Rice compression algorithm. The research will be conducted two phases of testing, namely the stage of encryption and compression process, and then continued with the ...
Journal of Discrete Mathematical Sciences & CryptographyKhadir, Omar, 2008. Algorithm for Factoring some RSA and Rabin Moduli. J. Discrete Math. Sci. Cryptography, 11(5):537-543.O. Khadir, Algorithm For Factoring Some RSA and Rabin Moduli, J. Discrete Math. Sci. and Cryptography. 11, no....
The experimental results show that the proposed algorithms are asymptotically tight to the existing decryption algorithm in the Rabin cryptosystem with the key composed of two distinct primes while maintaining increased generality.Zhan, JustinUniv Arkansas Dept Comp Sci & Comp Engn Fayetteville AR 72701...
This paper introduces digital signature andpublic key cryptography,analyzes group signature algorithm,and puts forward digital signature trends matching the new demands of the security of network communication. 首先介绍了数字签名技术及公钥体制 ,具体分析了多点对一点的群数字签名方案 ,最后给出了为适应Internet...