Joint Operation in Public Key Cryptography

Abstract

We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become interested in cryptography. We believe that the encoding of cryptographic algorithms is an important step in that direction, and it is the main reason why in this paper we present a software implementation of finding the inverse element, the operation which is essentially related to both ECC (Elliptic Curve Cryptography) and the RSA schemes of digital signature.

Authors and Affiliations

Dragan Vidakovic , Olivera Nikolic , Jelena Kaljevic , Dusko Parezanovic

Keywords

Related Articles

A Proposed Model for Detecting Facebook News’ Credibility

Social networks are currently one of the main News’ sources for most of their users. Moreover, News channels also consider social networks as main channels not only for spreading the news but also for measuring the feedb...

Video Streaming Analytics for Traffic Monitoring Systems

It is considered a difficult task to have check on traffic during rush hours. Traditional applications are man-ual, costly, time consuming, and the human factors involved. Large scale data is being generated from differe...

Energy Efficient Camera Solution for Video Surveillance

Video surveillance is growing rapidly, new problems and issues are also coming into view which needs serious and urgent attention. Video surveillance system requires a beneficial energy efficient camera solution. In this...

An Electrical Model to U-Slot Patch Antenna with Circular Polarization

The microstrip antenna is one of the best antenna structures, due to its low cost and compact design. In this paper, a coaxial feed circularly polarized square patch antenna is designed using the U-slot. The proposed ant...

Holistic Evaluation Framework for Automated Bug Triage Systems: Integration of Developer Performance

Bug Triage is an important aspect of Open Source Software Development. Automated Bug Triage system is essential to reduce the cost and effort incurred by manual Bug Triage. At present, the metrics that are available in t...

Download PDF file
  • EP ID EP135723
  • DOI 10.14569/IJACSA.2013.040320
  • Views 82
  • Downloads 0

How To Cite

Dragan Vidakovic, Olivera Nikolic, Jelena Kaljevic, Dusko Parezanovic (2013). Joint Operation in Public Key Cryptography. International Journal of Advanced Computer Science & Applications, 4(3), 121-124. https://europub.co.uk/articles/-A-135723