Journal ArticleDOI
Public key management for network security
Reads0
Chats0
TLDR
A tutorial is given on two public key cryptographic systems that provide an alternative to classical cryptographic key management techniques: the RSA system and the SEEK system.Abstract:
A tutorial is given on two public key cryptographic systems that provide an alternative to classical cryptographic key management techniques: the RSA system and the SEEK system. The certification of public numbers is discussed.read more
Citations
More filters
Patent
Enhanced cryptographic system and method with key escrow feature
TL;DR: In this article, a cryptographic system with key escrow feature that uses a method for verifiably splitting user's private encryption keys into components and for sending those components to trusted agents chosen by the particular users is provided.
Proceedings ArticleDOI
A network security monitor
TL;DR: Initial results demonstrate that many network attacks are detectable with the authors' monitor, although it can be defeated.
Patent
Rolling code security system
TL;DR: In this article, a rolling code transmitter is used in a security system for providing secure encrypted RF transmission comprising an interleaved trinary bit fixed code and rolling code, where a receiver demodulates the encrypted RF transmissions and recovers the fixed codes and rolling codes.
Journal ArticleDOI
A new carry-free division algorithm and its application to a single-chip 1024-b RSA processor
TL;DR: A carry-free division algorithm is described based on the properties of redundant signed digit (RSD) arithmetic to avoid carry propagation and uses the minimum hardware per bit, i.e. one full adder.
Patent
Method and system for securely displaying and confirming request to perform operation on host computer
TL;DR: In this article, a system for a client user remotely connected to a server computer by a client workstation such as a client personal computer to have securely displayed and to securely confirm that a request to access a resource on the server computer was actually requested by the client user, even if the security of the client computer has been compromised.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.