Results 301 to 310 of about 24,925 (334)
Some of the next articles are maybe not open access.

Elliptic Curves and Cryptography

2003
In the earlier cryptography articles, we have seen classical cryptosystems, various public-key cryptosystems and many primality tests. In this article we shall see how elliptic curves are used in cryptography. When public-key cryptography was introduced to the research community by Diffe and Hellman in 1976 [4], it represented an exciting innovation in
openaire   +1 more source

ECC — Elliptic Curves Cryptography

2010
Wie versprochen, mochte ich nach dem Gruppengesetz elliptischer Kurven nun die hervorstechendste Anwendung elliptischer Kurven in der Praxis vorstellen: Die Verwendung in der Kryptographie. Insbesondere gehe ich dabei auf Schlusselaustausch. asymmetrische Ver- und Entschlusselung sowie Signierung mit Hilfe von elliptischen Kurven ein.
openaire   +1 more source

Attributes and predictors of long COVID

Nature Medicine, 2021
Carole H Sudre   +2 more
exaly  

Security in quantum cryptography

Reviews of Modern Physics, 2022
Christopher Portmann, Renato Renner
exaly  

Entanglement-based secure quantum cryptography over 1,120 kilometres

Nature, 2020
Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly  

Advances in quantum cryptography

Advances in Optics and Photonics, 2020
Stefano Pirandola   +2 more
exaly  

Quantum cryptography

Reviews of Modern Physics, 2002
Wolfgang Tittel, Hugo Zbinden
exaly  

Quantum entanglement

Reviews of Modern Physics, 2009
Ryszard Horodecki   +2 more
exaly  

Home - About - Disclaimer - Privacy