Higher Security for Login System Using RSA and One-time Pad Schemes
L.M. Xin, K. Feng, “An improved sign-in scheme based on RSA cryptosystem”, International Conference on Computer Application and System Modeling, Taiyuan, 2010, pp.35 – 37.
R.L. Rivest, A. Shamir, L. Adleman, “A method for obtaining digital signatures and public key cryptosystems”, Communications of ACM, vol. 21, 1978, pp. 120 – 126.
W.Diffie, M.E. Hellman, “New directions in cryptography”, IEEE Transactions on Information Theory, vol. 22, 1976, pp. 644–654.
M. Sarvabhatla, C.M. Reddy , C.S. Vorugunti, “A Secure and Light Weight Authentication Service in Hadoop using One Time Pad”, International Symposium on Big Data and Cloud Computin, Chennai, 2015, pp.81-86.
J.A. Buchmann. “Introduction to Cryptography”, United States of America: Springer-Verlag, 2000.
O. Nibouche, M. Nibouche, A. Bouridane, “Highspeed FPGA implementation of RSA encryption algorithm”,Electronics, circuits and Systems, vol. 1, 2003, pp. 204-207.
A.Mazzero, L.Romano, G.P. Saggese, N. Mazzocca, “FPGA-based Implementation of a serial RSA processor”, Design, Automation and Test in Europe Conference and Exhibition, 2003, pp. 582 – 587.
J. Elbirt. “Understanding and Applying Cryptography and Data Security”, United Kingdom: Auerbach Publications, 2009.
Class: Math_BigInteger: https://pear.php.net/package/Math_BigInteger /docs/latest/ Math_BigInteger/Math_BigInteger.html.
K. Kim, B. Ndibanje, S. Park, H. Lee, “New Security Login System Using Tap and Gesture on Smartphone Touchscreen”, International Conference on Advanced Communication Technology, Pyeongchang, 2016, pp. 628 – 633.
A. Waheed, M.A. Shah, A. Khan, “Secure login Protocols: An Analysis on Modern Attacks and Solutions”, International Conference on Automation and Computing, Colchester, 2016, pp. 535 – 541.
W. Trappe, L. Washington. “Introduction to Cryptography with Coding Theory”, United States of America: Pearson, 2005.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.