Results 221 to 230 of about 671,694 (290)
Certificateless aggregate signcryption scheme with multi-ciphertext equality test for the internet of vehicles. [PDF]
Yang X, Luo X, Liu R, Li S, Yao K.
europepmc +1 more source
Hybrid quantum-chaotic key expansion enhances QKD rates using the Lorenz system. [PDF]
Danvirutai P +3 more
europepmc +1 more source
A compact public key encryption with equality test for lattice in cloud computing. [PDF]
He J, Ye Q, Yang Z, Wang S, Wang J.
europepmc +1 more source
Prediction of android ransomware with deep learning model using hybrid cryptography. [PDF]
Kalphana KR +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Functional Encryption, 2021
Following the patterns of the modern world, it is justifiable to say that Data is one of the most valuable assets today. This change in perspective has resulted in a usefulness and popularity boost to previously neglected fields like Information security and cryptography. Cryptography, i.e.
Ansh Riyal +2 more
openaire +2 more sources
Following the patterns of the modern world, it is justifiable to say that Data is one of the most valuable assets today. This change in perspective has resulted in a usefulness and popularity boost to previously neglected fields like Information security and cryptography. Cryptography, i.e.
Ansh Riyal +2 more
openaire +2 more sources
Pairing-Based Cryptography on Elliptic Curves
Mathematics in Computer Science, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Miret, Josep M. +2 more
openaire +3 more sources
jPBC: Java pairing based cryptography
2011 IEEE Symposium on Computers and Communications (ISCC), 2011It has been recently discovered that some cyclic groups that could be used in Cryptography admit a special bilinear pairing map that introduces extra structure to the group. Bilinear pairing maps were first used to break cryptosystems (see, for example, [1], [2], [3]) and later it was realized that the extra structure could be exploited to build ...
DE CARO, ANGELO, IOVINO, Vincenzo
openaire +3 more sources
Guide to Pairing-Based Cryptography
2017This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based ...
Nadia El Mrabet, M. Joye
openaire +2 more sources

