Results 201 to 210 of about 379,633 (259)
Redesigning healthcare facilities for sustainability: green hospital transformations and new infrastructure planning. [PDF]
Maden Ş, Kerse G.
europepmc +1 more source
Continuity of maternal and newborn health service provision among private sector players following donor transition. Hope amidst challenging implementation experiences in Uganda. [PDF]
Ssegujja E +6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Quantum Signature without Classical Private Key
International Journal of Theoretical Physics, 2022zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mingcan Chen +2 more
openaire +2 more sources
2003
Section 3.1 presents some classical ciphers for which both plaintext and cipher-text are characters or strings of characters. Section 3.2 covers the theory of modern cryptosystems and describes two early ciphers: Lucifer and DES. Section 3.3 presents five private-key block ciphers: FEAL, IDEA, RC6, Rijndael, and Serpent, of which the last three took ...
Josef Pieprzyk +2 more
openaire +1 more source
Section 3.1 presents some classical ciphers for which both plaintext and cipher-text are characters or strings of characters. Section 3.2 covers the theory of modern cryptosystems and describes two early ciphers: Lucifer and DES. Section 3.3 presents five private-key block ciphers: FEAL, IDEA, RC6, Rijndael, and Serpent, of which the last three took ...
Josef Pieprzyk +2 more
openaire +1 more source
Single Private-Key Generator Security Implies Multiple Private-Key Generators Security
2018This paper discusses the security of identity-based cryptography with multiple private-key generators (mPKG-IBC). Most mPKG-IBC schemes and protocols are statically secure where private-key generators (PKGs) cannot control a binding between a party and its PKG.
Atsushi Fujioka, Kazuki Yoneyama
openaire +1 more source
1999
Encryption techniques can use either public keys or secret keys. Secret-key encryption techniques use a secret key which is only known by the two communicating parities, as illustrated in Figure 18.1. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The
openaire +1 more source
Encryption techniques can use either public keys or secret keys. Secret-key encryption techniques use a secret key which is only known by the two communicating parities, as illustrated in Figure 18.1. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The
openaire +1 more source
Private-key algebraic-code encryptions
IEEE Transactions on Information Theory, 1989Summary: Public-key cryptosystems using very large distance algebraic codes were studied in the past. Private-key cryptosystems using simpler codes have also been the subject of a recent study. A new approach to the private- key cryptosystems is proposed which allows use of very simple codes of distance \(\leq 6\) and length of 250 bits or less.
Rao, T. R. N., Nam, Kil-Hyun
openaire +2 more sources
Private key and public key quantum cryptography
Summaries of Papers Presented at the Quantum Electronics and Laser Science Conference, 2003Summary form only given. Information has always been valuable, never more so than in recent decades, and throughout history people have turned to cryptography in an attempt to keep important information secret. Coherent manipulation of quantum states promises to rearrange the lists of possible and impossible cryptographic tasks.
openaire +1 more source

