Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Algebraic Methods for Constructing Asymmetric Cryptosystems
AAECC-3 Proceedings of the 3rd International Conference on Algebraic Algorithms and Error-Correcting Codes
C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems with very small key lengths
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
About the XL algorithm over GF(2)
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Cryptanalysis of HFEv and internal perturbation of HFE
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Cryptanalysis of the hidden matrix cryptosystem
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Hi-index | 0.00 |
SSL(Secure Socket Layer) is currently the most widely deployed security protocol, and consists of many security algorithms, but it has some problems on processing time and security. This paper proposes an HSEP(Highly Secure Electronic Payment) Protocol that provides better security and processing time than an existing SSL protocol. As HSEP consists of just F2mHECC, ThreeB(Block Byte Bit Cipher), SHA algorithm, and Multiple Signature, this protocol reduces handshaking process by concatenating two proposed F2mHECC public key and ThreeB symmetric key algorithm and improves processing time and security. In particular, Multiple signature and ThreeB algorithm provides better confidentiality than those used by SSL through three process of random block exchange, byte-exchange key and bit-xor key.