Key escrow system for network environment based on RSA algorithm

被引:0
|
作者
Yang, Bo
Wang, Yumin
机构
来源
Dianzi Kexue Xuekan/Journal of Electronics | 2000年 / 22卷 / 02期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:194 / 197
相关论文
共 50 条
  • [21] A threshold key escrow scheme based on public key cryptosystem
    Zhenfu Cao
    Science in China Series E: Technological Sciences, 2001, 44 : 441 - 448
  • [22] Boolean permutation-based key escrow
    Wu, Chuan-Kun
    Varadharajan, Vijay
    Computers and Electrical Engineering, 1999, 25 (04): : 291 - 304
  • [24] Research on key escrow technology Based on software
    Yu, Zhengli
    2018 INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY, 2019, 1168
  • [25] Boolean permutation-based key escrow
    Wu, CK
    Varadharajan, V
    COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (04) : 291 - 304
  • [26] An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA
    Zhang, Chunfu
    Liang, Yanchun
    Tavares, Adriano
    Wang, Lidong
    Gomes, Tiago
    Pinto, Sandro
    SYMMETRY-BASEL, 2024, 16 (03):
  • [27] A RSA key security gradating algorithm based on threshold attack time
    Tan W.
    Xi J.
    Wang X.
    Journal of Software, 2011, 6 (09) : 1873 - 1880
  • [28] Profiling Attack against RSA Key Generation Based on a Euclidean Algorithm
    de la Fe, Sadiel
    Park, Han-Byeol
    Sim, Bo-Yeon
    Han, Dong-Guk
    Ferrer, Carles
    INFORMATION, 2021, 12 (11)
  • [29] Revocable Key Identity Based Cryptography without Key Escrow Problem
    Gupta, Swati
    Gupta, Vipul
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 443 - 448
  • [30] NEW KEY GENERATION ALGORITHM FOR RSA CRYPTOSYSTEM
    SAKAI, R
    MORII, M
    KASAHARA, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1994, E77A (01) : 89 - 97