Now showing items 1-4 of 4
Computational cost analysis of elliptic curve arithmetic
Elliptic curves are proposed for the asymmetrical cryptography by Neal Koblitz and Victor Miller in 1986 separately. Elliptic curve cryptography (ECC) is utilized by hardware embedded solutions on mobile equipments and ...
Satellite networks for key management
The cryptographic key management center is the place where all the cryptographical protocols and related keys are in action. Traditionally the key management centers operate on the ground. However; with the satellites, it ...
Reusing static keys in key agreement protocols
Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we ...
Multi-party off-the-record messaging
(Association for Computing Machinery, 2009)
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation is no less important than secrecy and ...