Journal of Engineering and Applied Sciences
Year:
2019
Volume:
14
Issue:
21
Page No.
7913 - 7916
New Approach of RSA Algorithm based on Three-Pass Protocol
Authors :
AqeelS. Azez
References
Abdullah, A.A., 2015. Modified quantum three pass protocol based on hybrid cryptosystem. Ph.D Thesis, Eastern Mediterranean University, Famagusta, Northern Cyprus.
Abdullah, A.A., R. Khalaf and M. Riza, 2015. A realizable quantum three-pass protocol authentication based on hill-cipher algorithm. Math. Prob. Eng., 2015: 1-6.
Direct Link | Beissinger, J. and V. Pless, 2006. The Cryptoclub: Using Mathematics to Make and Break Secret Codes. CRC Press, Boca Raton, Florida, USA., ISBN:9781568812236, Pages: 200.
Bellare, M., A. Boldyreva and S. Micali, 2000. Public-key encryption in a multi-user setting: Security proofs and improvements. Proceedings of the International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT 2000), May 14-18, 2000, Springer, Berlin, Germany, ISBN:978-3-540-67517-4, pp: 259-274.
Elbaz, L. and H. Bar-El, 2000. Strength assessment of encryption algorithms. Master Thesis, Discretix Technologies Ltd, Santa Clara, California, USA.
Lim, M.H., C.M. Yeoh, S. Lee, H. Lim and H. Lee, 2008. A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves. Proceedings of the International Conference on Research in Networking, May 5-9, 2008, Springer, Singapore, ISBN:978-3-540-79548-3, pp: 170-182.
Massey, J.L., 1988. An introduction to contemporary cryptology. Proc. IEEE., 76: 533-549.
CrossRef | Direct Link | Rubin, F., 2011. Device, system and method for fast secure message encryption without key distribution. U.S. Patent and Trademark Office, Washington, DC. USA. https://patents.google.com/patent/US7907723B2/en
Stallings, W. and L. Brown, 2008. Computer Security: Principles and Practice. Pearson Education India, India, ISBN:9788131733516, Pages: 799.
Stallings, W., 2006. Cryptography and Network Security: Principles and Practices. 3rd Edn., Pearson Education India, New Dehli, India, ISBN: 978-1-25-902988-2, Pages: 492.
Thomas, C.H., C.E. Leiserson, R.L. Rivest and C. Stein, 2001. 2.3: Designing Algorithms. In: Introduction to Algorithms, Thomas, C.H., C.E. Leiserson, R.L. Rivest and C. Stein (Eds.). MIT Press, Massachusetts, USA., ISBN:9780262032933, pp: 27-37.
Uchoa, A.G.D., M.E. Pellenz, A.O. Santin and C.A. Maziero, 2007. A three-pass protocol for cryptography based on padding for wireless networks. Proceeding of the 2007 4th IEEE International Conference on Consumer Communications and Networking, January 11-13, 2007, IEEE, Las Vegas, Nevada, USA., pp: 287-291.
Yang, L., L.A. Wu and S. Liu, 2002. Quantum three-pass cryptography protocol. Proceeding of the SPIE Conference on Quantum Optics in Computing and Communications Vol. 4917, September 13, 2002, SPIE, Bellingham, Washington, USA., pp: 106-112.