Results 301 to 310 of about 24,925 (334)
Some of the next articles are maybe not open access.
Elliptic Curves and Cryptography
2003In the earlier cryptography articles, we have seen classical cryptosystems, various public-key cryptosystems and many primality tests. In this article we shall see how elliptic curves are used in cryptography. When public-key cryptography was introduced to the research community by Diffe and Hellman in 1976 [4], it represented an exciting innovation in
openaire +1 more source
ECC — Elliptic Curves Cryptography
2010Wie versprochen, mochte ich nach dem Gruppengesetz elliptischer Kurven nun die hervorstechendste Anwendung elliptischer Kurven in der Praxis vorstellen: Die Verwendung in der Kryptographie. Insbesondere gehe ich dabei auf Schlusselaustausch. asymmetrische Ver- und Entschlusselung sowie Signierung mit Hilfe von elliptischen Kurven ein.
openaire +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
The role of adsorbed hydroxide in hydrogen evolution reaction kinetics on modified platinum
Nature Energy, 2020Ian T Mccrum, Marc T M Koper
exaly
Entanglement-based secure quantum cryptography over 1,120 kilometres
Nature, 2020Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly
Advances in quantum cryptography
Advances in Optics and Photonics, 2020Stefano Pirandola +2 more
exaly

