Joint Operation in Public Key Cryptography

Abstract

We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become interested in cryptography. We believe that the encoding of cryptographic algorithms is an important step in that direction, and it is the main reason why in this paper we present a software implementation of finding the inverse element, the operation which is essentially related to both ECC (Elliptic Curve Cryptography) and the RSA schemes of digital signature.

Authors and Affiliations

Dragan Vidakovic , Olivera Nikolic , Jelena Kaljevic , Dusko Parezanovic

Keywords

Related Articles

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Recently, wireless sensor networks (WSNs) have gained a great attention due to their ability to monitor various environments, such as temperature, pressure sound, etc. They are constructed from a large number of sensor n...

An Agent-based Simulation for Studying Air Pollution from Traffic in Urban Areas: The Case of Hanoi City

In urban areas, traffic is one of the main causes of air pollution. Establishing an effective solution to raise public awareness of this phenomenon could help to significantly reduce the level of pollution in urban areas...

Towards Securing Medical Documents from Insider Attacks

Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the...

Adaptive Lockable Units to Improve Data Availability in a Distributed Database System

Distributed database systems have become a phenomenon and have been considered a crucial source of information for numerous users. Users with different jobs are using such systems locally or via the Internet to meet thei...

An Anti-Pattern-based Runtime Business Process Compliance Monitoring Framework

Today's dynamically changing business and com-pliance environment demand enterprises to continuously ensure their compliance with various laws, regulations and standards. Several business studies have concluded that comp...

Download PDF file
  • EP ID EP135723
  • DOI 10.14569/IJACSA.2013.040320
  • Views 95
  • Downloads 0

How To Cite

Dragan Vidakovic, Olivera Nikolic, Jelena Kaljevic, Dusko Parezanovic (2013). Joint Operation in Public Key Cryptography. International Journal of Advanced Computer Science & Applications, 4(3), 121-124. https://europub.co.uk/articles/-A-135723