Joint Operation in Public Key Cryptography
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 3
Abstract
We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become interested in cryptography. We believe that the encoding of cryptographic algorithms is an important step in that direction, and it is the main reason why in this paper we present a software implementation of finding the inverse element, the operation which is essentially related to both ECC (Elliptic Curve Cryptography) and the RSA schemes of digital signature.
Authors and Affiliations
Dragan Vidakovic , Olivera Nikolic , Jelena Kaljevic , Dusko Parezanovic
Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network
Recently, wireless sensor networks (WSNs) have gained a great attention due to their ability to monitor various environments, such as temperature, pressure sound, etc. They are constructed from a large number of sensor n...
An Agent-based Simulation for Studying Air Pollution from Traffic in Urban Areas: The Case of Hanoi City
In urban areas, traffic is one of the main causes of air pollution. Establishing an effective solution to raise public awareness of this phenomenon could help to significantly reduce the level of pollution in urban areas...
Towards Securing Medical Documents from Insider Attacks
Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the...
Adaptive Lockable Units to Improve Data Availability in a Distributed Database System
Distributed database systems have become a phenomenon and have been considered a crucial source of information for numerous users. Users with different jobs are using such systems locally or via the Internet to meet thei...
An Anti-Pattern-based Runtime Business Process Compliance Monitoring Framework
Today's dynamically changing business and com-pliance environment demand enterprises to continuously ensure their compliance with various laws, regulations and standards. Several business studies have concluded that comp...