Results 21 to 30 of about 407,192 (292)

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

open access: goldIACR Cryptology ePrint Archive, 2020
. Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years,
Yudi Zhang   +5 more
openalex   +3 more sources

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography [PDF]

open access: goldKSII Transactions on Internet and Information Systems, 2019
With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.’s protocol can neither resist off-line guessing attack nor preserve user ...
Shuming Qiu   +5 more
openalex   +2 more sources

A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks [PDF]

open access: greenIEEE Communications Surveys and Tutorials, 2011
Shushan Zhao   +3 more
openalex   +2 more sources

Enhancing Security for Mobile Ad hoc Networks by Using Identity Based Cryptography [PDF]

open access: bronze, 2014
Shohreh Honarbakhsh   +3 more
openalex   +2 more sources

An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security

open access: bronzeSN Computer Science, 2020
Olufunke Rebecca Vincent   +3 more
openalex   +2 more sources

Efficient Unified Arithmetic for Hardware Cryptography [PDF]

open access: yes, 2008
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya   +3 more
core   +2 more sources

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage

open access: yesIEEE Transactions on Dependable and Secure Computing, 2023
The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity auditing schemes would inevitably become unable to work. To deal with this problem,
Wenting Shen   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy