메뉴 건너뛰기




Volumn 42, Issue , 2013, Pages 299-307

Location based security for smart grid applications

Author keywords

GPT; RSA; Security; Smart grid

Indexed keywords


EID: 84898763266     PISSN: 18766102     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.egypro.2013.11.030     Document Type: Conference Paper
Times cited : (10)

References (15)
  • 4
    • 34547326126 scopus 로고
    • Public-Key cryptosystems based on linear codes over large alphabets efficiency and weakness
    • Essex: Formara Limited
    • E. M. Gabidulin, "Public-Key Cryptosystems Based on Linear Codes over Large Alphabets: Efficiency and Weakness, " in: Codes and Ciphers, Editor: P. G. Farrell, pp. 17-32, Essex: Formara Limited, 1995.
    • (1995) Codes and Ciphers, Editor: P. G. Farrell , pp. 17-32
    • Gabidulin, E.M.1
  • 5
    • 43949117635 scopus 로고    scopus 로고
    • A new brute-force attack for gPT and variants
    • Springer-Verlag
    • R. Overbeck, "A new brute-force attack for GPT and variants, " In: Proc. of Mycrypt 2005, vol. 3517 of LNCS, pp. 5-63, Springer-Verlag, 2005.
    • (2005) Proc. of Mycrypt 2005 3517 of LNCS , pp. 5-63
    • Overbeck, R.1
  • 6
    • 43249125012 scopus 로고    scopus 로고
    • Brute-force attacks public key cryptosystem based on gabidulin codes
    • Overbeck R., "Brute-force attacks Public Key Cryptosystem Based on Gabidulin codes, " J. Cryptology, 21(2): 280-301, 2008.
    • (2008) J. Cryptology , vol.21 , Issue.2 , pp. 280-301
    • Overbeck, R.1
  • 7
    • 43949122880 scopus 로고    scopus 로고
    • Attacks and counter-attacks on the gPT public key cryptosystem
    • Springer Netherlands, August
    • E. M. Gabidulin, "Attacks and counter-attacks on the GPT public key cryptosystem, " Designs Codes and Cryptography. Vol. 48, No. 2, pp. 171-177, Springer Netherlands, August 2008.
    • (2008) Designs Codes and Cryptography. , vol.48 , Issue.2 , pp. 171-177
    • Gabidulin, E.M.1
  • 9
    • 84891902542 scopus 로고    scopus 로고
    • Modified niederreiter type of gPT cryptosystem based on reducible rank codes
    • Springer, DOI: 10. 1007/s10623-012-9757-4
    • E. Khan, E. Gabidulin, B. Honary, H. Ahmed Modified Niederreiter Type of GPT Cryptosystem Based on Reducible Rank Codes', Designs Codes and Cryptography, Springer, DOI: 10. 1007/s10623-012-9757-4, 2012.
    • (2012) Designs Codes and Cryptography
    • Khan, E.1    Gabidulin, E.2    Honary, B.3    Ahmed, H.4
  • 10
    • 1542341270 scopus 로고    scopus 로고
    • Location-Based authentication grounding cyberspace for better security
    • Feb
    • Denning, D. E. and MacDoran, P. F., Location-Based Authentication: Grounding Cyberspace for Better Security, Computer Fraud &Security, Vol 2, pp. 12-16. Feb. 1996.
    • (1996) Computer Fraud &Security , vol.2 , pp. 12-16
    • Denning, D.E.1    Macdoran, P.F.2
  • 11
    • 77955741280 scopus 로고    scopus 로고
    • An improved estimation of the rSA quantum breaking success rate
    • P. Zawadzki, An Improved Estimation of the RSA Quantum Breaking Success Rate, in Proc. NDT (1), pp. 234-240, 2010.
    • (2010) Proc. NDT , Issue.1 , pp. 234-240
    • Zawadzki, P.1
  • 12
    • 80052020068 scopus 로고    scopus 로고
    • McEliece and niederreiter cryptosystems that resist quantum fourier sampling attacks
    • Phillip Rogaway(Ed. ). Springer-Verlag, Berlin, Heidelberg
    • H. Dinh, C. Moore, A. Russell: McEliece and niederreiter cryptosystems that resist quantum fourier sampling attacks'. In Proceedings of the 31st annual conference on Advances in cryptology (CRYPTO'11), Phillip Rogaway (Ed. ). Springer-Verlag, Berlin, Heidelberg, 761-779, 2011.
    • (2011) Proceedings of the 31st Annual Conference on Advances in cryptology(CRYPTO'11) , pp. 761-779
    • Dinh, H.1    Moore, C.2    Russell, A.3
  • 13
    • 0346196669 scopus 로고    scopus 로고
    • New technique for decoding codes in the rank metric and its cryptography applications
    • Ourivski A. V., Johansson T.,: New Technique for Decoding Codes in the Rank Metric and Its Cryptography Applications''; Problems of Information Transmission, 38(3), (2002), 237-246.
    • (2002) Problems of Information Transmission , vol.38 , Issue.3 , pp. 237-246
    • Ourivski, A.V.1    Johansson, T.2
  • 14
    • 0002448405 scopus 로고
    • A public key cryptosystem based on algebraic coding theory
    • Feb
    • McEliece, R. J.,: A Public Key cryptosystem Based on Algebraic coding theory", JPL Deep Space Network Progress Report, Feb 1978, pp114-116
    • (1978) JPL Deep Space Network Progress Report , pp. 114-116
    • McEliece, R.J.1
  • 15
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • Niederreiter, H.,: Knapsack-type cryptosystems and algebraic coding theory", Prob. of Control and Inf. Theory, 15, 1986, pp-19-34 139
    • (1986) Prob. of Control and Inf. Theory , vol.15 , Issue.139 , pp. 19-34
    • Niederreiter, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.