Results 221 to 230 of about 42,947 (261)
Some of the next articles are maybe not open access.

Relativized cryptography

IEEE Transactions on Information Theory, 1979
It appears to be very difficult to give a formal definition of computational security for public-key cryptography. A slightly different notion, called transient-key cryptography, is defined for which a natural definition of security against chosen-plaintext attacks is given.
openaire   +3 more sources

Chaos and cryptography

IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 2001
Summary: The authors present their opinion and research results collected during the last ten years on the conjunction of chaos and cryptography. Special consideration is taken to show some general critical points and limitations of this approach and to provide some pointers to a comprehensive and careful evaluation of the cryptographical properties of
W. Schwarz, F. Dachselt
openaire   +3 more sources

Cryptography

Oberwolfach Reports, 2015
The Oberwolfach workshop Cryptography brought together scientists from cryptography with mathematicians specializing in the algorithmic problems underlying cryptographic security. The goal of the workshop was to stimulate interaction and collaboration that enables a holistic approach to designing cryptography from
Johannes A. Buchmann, Shafi Goldwasser
openaire   +1 more source

Cryptography

2011
In this chapter, we discuss the use of cryptography. We go over the history of such tools, from very simple substitution ciphers to the fairly complex electromechanical machines that were used just before the invention of the first modern computing systems, and how they form the basis for many of our modern algorithms.
openaire   +3 more sources

Cryptography and factorization methods in cryptography

2018
The Security of the RSA cryptosystem depends on the difficulty of finding the prime factors of large integers. Here we explore some of the factorization techniques currently available in cryptography. After giving an overview of cryptography we discuss some of the factorization techniques like Fermat’s factoring, Pollards p-1 method and continued
openaire   +2 more sources

Cryptography with chaos

Physics Letters A, 1998
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +3 more sources

A Cryptography Primer

2009
Publisher Summary Traditionally, cryptography has consisted of any means possible whereby communications may be encrypted and transmitted. This could be as simple as using a language with which the opposition is not familiar. Since the beginning of sentient language, cryptography has been a part of communication. It is as old as language itself.
openaire   +2 more sources

Security in quantum cryptography

Reviews of Modern Physics, 2022
Christopher Portmann, Renato Renner
exaly  

Foundations of Cryptography

2001
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy