Por favor, use este identificador para citar o enlazar a este item:
http://hdl.handle.net/10261/12993
COMPARTIR / EXPORTAR:
SHARE CORE BASE | |
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE | |
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Álvarez Marañón, Gonzalo | - |
dc.contributor.author | Hernández Encinas, Luis | - |
dc.contributor.author | Muñoz Masqué, Jaime | - |
dc.date.accessioned | 2009-05-12T07:19:28Z | - |
dc.date.available | 2009-05-12T07:19:28Z | - |
dc.date.issued | 2008-05 | - |
dc.identifier.citation | IEEE Transactions on Circuits and Systems. Part 2: Express Briefs 55(5): 423-426 (2008) | en_US |
dc.identifier.issn | 1549-7747 | - |
dc.identifier.uri | http://hdl.handle.net/10261/12993 | - |
dc.description | 4 pages, no figures. | en_US |
dc.description.abstract | Recently, Rama Murthy and Swamy proposed a symmetric cryptosystem based on the Brahmagupta-Bhaskara (BB) equation. The BB equation is the quadratic Diophantine equation nx^2 + k = y^2, where k is an integer and n is a positive integer such that sqrt(n) is irrational. For the particular case k=1, the equation is called the Pell equation. The proposed cryptosystem was modified later by the same authors in order to avoid the cryptanalysis given by Youssef. Below, a known-plaintext attack to both cryptosystems is presented. | en_US |
dc.description.sponsorship | This work was supported in part by the Ministerio de Educación y Ciencia of Spain under Grant SEG2004-02418. | en_US |
dc.format.extent | 209672 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | eng | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
dc.rights | openAccess | en_US |
dc.subject | Brahmagupta-Bhaskara equation | en_US |
dc.subject | Cryptanalysis | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Pell equation | en_US |
dc.title | Known-Plaintext Attack to Two Cryptosystems Based on the BB Equation | en_US |
dc.type | artículo | en_US |
dc.identifier.doi | 10.1109/TCSII.2007.914441 | - |
dc.description.peerreviewed | Peer reviewed | en_US |
dc.relation.publisherversion | http://dx.doi.org/10.1109/TCSII.2007.914441 | en_US |
dc.type.coar | http://purl.org/coar/resource_type/c_6501 | es_ES |
item.languageiso639-1 | en | - |
item.fulltext | With Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | open | - |
item.openairetype | artículo | - |
Aparece en las colecciones: | (IFA) Artículos |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
BBCryptanalysis_Final.pdf | 204,76 kB | Adobe PDF | Visualizar/Abrir |
CORE Recommender
SCOPUSTM
Citations
9
checked on 20-abr-2024
WEB OF SCIENCETM
Citations
5
checked on 27-feb-2024
Page view(s)
320
checked on 23-abr-2024
Download(s)
429
checked on 23-abr-2024
Google ScholarTM
Check
Altmetric
Altmetric
NOTA: Los ítems de Digital.CSIC están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.