Isonumber based Iso-Key Interchange Protocol for Network Communication |
Dani, Mamta S.
(Department of Applied Mathematics, Yeshwantrao Chavan College of Engineering)
Meshram, Akshaykumar (Department of Applied Mathematics, Yeshwantrao Chavan College of Engineering) Pohane, Rupesh (Department of Applied Mathematics, Suryodaya College of Engineering and Technology) Meshram, Rupali R. (Department of Mathematics, Kamla Nehru Mahavidyalaya) |
1 | Alvarez R., Aplicaciones de las matrices por bloques a los criptosistemas de cifrado en flujo, Ph.D. Thesis Dissertation, University of Alicante, (2005). (https://rua.ua.es/dspace/bitstream/10045/13571/1/tesis_ralvarez.pdf) |
2 | Meshram C., "The Beta Cryptosystem," Bulletin of Electrical Engineering and Informatics, 4 (2), pp. 155-159, (2015). (http://journal.portalgaruda.org/index.php/EEI/article/view/442) DOI |
3 | Meshram C. and Meshram S. A., "PKC Scheme Based on DDLP," International Journal of Information & Network Security, 2 (2), pp. 154-159, (2013). (http://ijins.iaescore.com/index.php/IJINS/article/view/17480) |
4 | Meshram C. and Meshram S. A., "A Non-secret key Cryptosystem based on IFP and DLP," International Journal of Advanced Research in Computer Science, 2 (5), pp. 616- 619, (2011). DOI: 10.26483/ijarcs.v2i5.823 |
5 | Meshram C. and Meshram S. A., "An identity based cryptographic model for discrete logarithm and integer factoring based cryptosystem" Information Processing Letters, 113 (10), pp. 375-380, (2013). DOI: 10.1016/j.ipl.2013.02.009 DOI |
6 | Meshram C., "An Efficient ID-based Cryptographic Encryption based on Discrete Logarithm Problem and Integer Factorization Problem," Information Processing Letters, 115 (2), pp. 351-358, (2015). DOI: 10.1016/j.ipl.2014.10.007 DOI |
7 | Meshram A., Meshram C. and Khobragade N. W., "An IND-CPA secure PKC technique based on dihedral group," Indian Journal of Computer Science and Engineering, 8 (2), pp.88-94, (2017). (http://www.ijcse.com/docs/INDJCSE17-08-02-024.pdf) |
8 | Meshram C. and Powar P. L., "An Efficient Identity-based QER Cryptographic Scheme," Complex & Intelligent Systems, 2 (4), pp. 285-291, (2016). DOI: 10.1007/s40747- 016-0030-8 DOI |
9 | Blake, Seroussi G., Smart N., "Elliptic Curves in Cryptography," London Mathematical Society, Lecture Notes. Series, vol. 265, Cambridge University Press, pp. 001-204, (1999). DOI: 10.1017/CBO9781107360211 DOI |
10 | Climent J. J., Ferrandiz F., Vicent J. F., Zamora A., "A non linear elliptic curve cryptosystem based on matrices," Applied Mathematics and Computation, 174, pp. 150-164, (2006). DOI: 10.1016/j.amc.2005.03.032 DOI |
11 | A. Meshram, C. Meshram and N. W. Khobragade, "An INDCCA2 secure non-secret key cryptographic protocol using suzuki 2-group," Indian Journal of Science and Technology, 10 (12), pp.01-08, (2017). DOI: 10.17485/ijst/2017/v10i12/111588 DOI |
12 | Meshram A., Meshram C. and Khobragade N. W., "Non-secret key cryptographic technique based on suzuki 2-group," International Journal of Advanced Research in Computer Science, 8 (03), pp.300-305, (2017). DOI: 10.26483/ijarcs.v8i3.3000 |
13 | Meshram A., Meshram C., Bagde S. D. and Meshram R. R., "RIPIC based key exchange protocol," Advances in Mathematics: Scientific Journal, 9 (12), pp. 11169-11177, (2020). DOI: 10.37418/amsj.9.12.97 DOI |
14 | Climent J. J., Gorla E., Rosenthal J., "Cryptanalysis of the CFVZ cryptosystem," Advances in Mathematics of Communications, 1, pp. 1-11, (2007). DOI: 10.3934/amc.2007.1.1 DOI |
15 | Thatere A. B., Meshram A., Meshram C., Wazalwar N. M., "SIFK based Isobeta Cryptosystem," International Journal of Engineering Trends and Technology, 69 (7), pp. 76-79, (2021. DOI: 10.14445/22315381/IJETT-V69I7P211 DOI |
16 | Santilli R. M., "Isonumbers and genonumbers of dimension 1, 2, 4, 8, their isoduals and pseudoduals, and "hidden numbers" of dimension 3, 5, 6, 7," Algebras, Groups and Geometries, 10, pp. 273-322, (1993). (http://www.santilli-foundation.org/docs/Santilli-34.pdf) |
17 | Hoffman K., Kunze R., "Linear Algebra," Prentice-Hall, New Jersey, (1971). (https://www.cin.ufpe.br/~jrsl/Books/Linear%20Algebra%20-%20Kenneth%20Hoffman%20&%20Ray%20Kunze%20.pdf) |
18 | Koblitz N., "A Course in Number Theory and Cryptography," Springer-Verlag, (1987). (http://almuhammadi.com/sultan/crypto_books/Koblitz.2ndEd.pdf) |
19 | Odoni R. W. K., Varadharajan V., Sanders P. W., "Public key distribution in matrix rings," Electronic Letters, 20, pp. 386-387, (1984). DOI: 10.1049/el:19840267 DOI |
20 | Menezes A., Wu Y-H., "The discrete logarithm problem in GLdn; qÞ," Ars Combinatoria, 47, pp. 22-32, (1997). (https://dblp.org/db/journals/arscom/arscom47.html#MenezesW97) |
21 | Climent J. J., "Propiedades espectrales de matrices:el indice de matrices triangulares por bloques, La raiz Perron de matrices cociclicas no negativas," Thesis for Doctoral Degree, (1993). (http://www.cervantesvirtual.com/nd/ark:/59851/bmcmk686) |
22 | Alvarez R., Tortosa L., Vicent J-F, Zamora A., "Analysis and design of a secure key exchange scheme," Information Sciences, 179 (12), pp. 2014-2021, (2009). DOI: 10.1016/j.ins.2009.02.008 DOI |
23 | Diffie W., Hellman M., "New directions in cryptography," IEEE Transactions on Information Theory, 22, pp. 644-654, (1976). DOI: 10.1109/TIT.1976.1055638 DOI |
24 | Meshram C., "A Cryptosystem based on Double Generalized Discrete Logarithm Problem," International Journal of Contemporary Mathematical Sciences, 6 (6), pp. 285 - 297, (2011). (http://www.m-hikari.com/ijcms-2011/5-8-2011/meshramIJCMS5-8-2011.pdf) |
25 | Ko S., Leem C. S., Na Y. J., Yoon C. Y., "Distribution of digital contents based on non-secret key considering execution speed and security," Information Sciences, 174 (3-4), pp. 237-250, (2005). DOI: 10.1016/j.ins.2004.08.011 DOI |
26 | Dani M. S., Meshram A., Meshram C., and Wazalwar N. M., "An efficient key exchange scheme using santilli'sisofields second-kind for secure communication," Advances in Mathematics: Scientific Journal, 10(2), pp. 1131-1139, (2021). DOI: 10.37418/amsj.10.2.39 DOI |
27 | Meshram C. and Obaidat M. S., "An ID-based Quadratic-Exponentiation Randomized Cryptographic Scheme," IEEE International Conference on Computer, Information and Telecommunication Systems, pp.1-5, (2015). DOI: 10.1109/CITS.2015.7297722 DOI |
28 | Meshram C., "An efficient ID-based Beta Cryptosystem," International Journal of Security and Its Applications, 9 (2), pp. 189-202, (2015). (http://article.nadiapub.com/IJSIA/vol9_no2/18.pdf) DOI |
29 | Meshram C., Meshram S. A. and Zhang M., "An ID-based cryptographic mechanisms based on GDLP and IFP," Information Processing Letters, 112 (19), pp.753-758, (2012). DOI: 10.1016/j.ipl.2012.06.018 DOI |
30 | Meshram C., Powar P. L., Obaidat M. S. and Lee C. C., "An IBE Technique using Partial Discrete Logarithm," Procedia Computer Science, 93, pp. 735-741, (2016). DOI: 10.1016/j.procs.2016.07.282 DOI |
31 | Meshram C., Obaidat M. S. and Meshram A., "New efficient QERPKC based on partial discrete logarithm problem," 2020 International Conference on Computer, Information and Telecommunication Systems (CITS), Hangzhou, China, pp. 1-5, (2020), DOI: 10.1109/CITS49457.2020.9232533. DOI |
32 | Dani M. S., Meshram A. and Meshram C., "Santilli'sisofields firstkind based key exchange protocol," Journal of Physics: Conference Series, 1913 (1), 012095, (2021). DOI: 10.1088/1742-6596/1913/1/012095 DOI |