Results 311 to 320 of about 10,264,102 (368)
Some of the next articles are maybe not open access.

A Private Key Management Scheme

2009 WASE International Conference on Information Engineering, 2009
A safety private key management scheme ispresent in this paper. It uses an online assistantserver to cooperates with user device to performprivate key operation. And a light-weightbidirectional authentication is used beforepublic key algorithm that can avoid Denial ofService attack. Our scheme was more suitablefor private key operation in frequency.
Huming Gao, Xin Lv
openaire   +1 more source

Public and Private Key Cryptography

2021
Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
openaire   +1 more source

Oblivious Key-Value Stores and Amplification for Private Set Intersection

IACR Cryptology ePrint Archive, 2021
Gayathri Garimella   +4 more
semanticscholar   +1 more source

Asymmetric Encryption: Public/Private Keys

2019
Asymmetric encryption is one of the most important advances in cryptographic security ever made. It underpins all of the security on the Web, in your Wi-Fi connections, and in secure email and other communication of all kinds. It is ubiquitous, but it is also subtle and easy to implement or use incorrectly, and a lack of correctness means a sometimes ...
Seth James Nielson   +1 more
openaire   +1 more source

Decoy-state method for quantum-key-distribution-based quantum private query

Science China Physics Mechanics and Astronomy, 2022
B. Liu   +5 more
semanticscholar   +1 more source

Encoding Private Key in Fingerprint

2005
Electronic transactions require secure electronic signature techniques, which can provide the authentication of the signing individual, non-repudiation of the signature and protection of the integrity of the document using strong cryptographic methods.
Ernő Jeges   +2 more
openaire   +1 more source

Registration-Based Encryption: Removing Private-Key Generator from IBE

IACR Cryptology ePrint Archive, 2018
Sanjam Garg   +3 more
semanticscholar   +1 more source

From Minicrypt to Obfustopia via Private-Key Functional Encryption

Journal of Cryptology, 2017
Ilan Komargodski, Gil Segev
semanticscholar   +1 more source

Public-key quantum digital signature scheme with one-time pad private-key

Quantum Information Processing, 2017
Feng-Lin Chen   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy