Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 21
Page No. 7913 - 7916

New Approach of RSA Algorithm based on Three-Pass Protocol

Authors : AqeelS. Azez

References

Abdullah, A.A., 2015. Modified quantum three pass protocol based on hybrid cryptosystem. Ph.D Thesis, Eastern Mediterranean University, Famagusta, Northern Cyprus.

Abdullah, A.A., R. Khalaf and M. Riza, 2015. A realizable quantum three-pass protocol authentication based on hill-cipher algorithm. Math. Prob. Eng., 2015: 1-6.
Direct Link  |  

Beissinger, J. and V. Pless, 2006. The Cryptoclub: Using Mathematics to Make and Break Secret Codes. CRC Press, Boca Raton, Florida, USA., ISBN:9781568812236, Pages: 200.

Bellare, M., A. Boldyreva and S. Micali, 2000. Public-key encryption in a multi-user setting: Security proofs and improvements. Proceedings of the International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT 2000), May 14-18, 2000, Springer, Berlin, Germany, ISBN:978-3-540-67517-4, pp: 259-274.

Elbaz, L. and H. Bar-El, 2000. Strength assessment of encryption algorithms. Master Thesis, Discretix Technologies Ltd, Santa Clara, California, USA.

Lim, M.H., C.M. Yeoh, S. Lee, H. Lim and H. Lee, 2008. A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves. Proceedings of the International Conference on Research in Networking, May 5-9, 2008, Springer, Singapore, ISBN:978-3-540-79548-3, pp: 170-182.

Massey, J.L., 1988. An introduction to contemporary cryptology. Proc. IEEE., 76: 533-549.
CrossRef  |  Direct Link  |  

Rubin, F., 2011. Device, system and method for fast secure message encryption without key distribution. U.S. Patent and Trademark Office, Washington, DC. USA. https://patents.google.com/patent/US7907723B2/en

Stallings, W. and L. Brown, 2008. Computer Security: Principles and Practice. Pearson Education India, India, ISBN:9788131733516, Pages: 799.

Stallings, W., 2006. Cryptography and Network Security: Principles and Practices. 3rd Edn., Pearson Education India, New Dehli, India, ISBN: 978-1-25-902988-2, Pages: 492.

Thomas, C.H., C.E. Leiserson, R.L. Rivest and C. Stein, 2001. 2.3: Designing Algorithms. In: Introduction to Algorithms, Thomas, C.H., C.E. Leiserson, R.L. Rivest and C. Stein (Eds.). MIT Press, Massachusetts, USA., ISBN:9780262032933, pp: 27-37.

Uchoa, A.G.D., M.E. Pellenz, A.O. Santin and C.A. Maziero, 2007. A three-pass protocol for cryptography based on padding for wireless networks. Proceeding of the 2007 4th IEEE International Conference on Consumer Communications and Networking, January 11-13, 2007, IEEE, Las Vegas, Nevada, USA., pp: 287-291.

Yang, L., L.A. Wu and S. Liu, 2002. Quantum three-pass cryptography protocol. Proceeding of the SPIE Conference on Quantum Optics in Computing and Communications Vol. 4917, September 13, 2002, SPIE, Bellingham, Washington, USA., pp: 106-112.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved