Results 311 to 320 of about 10,264,102 (368)
Some of the next articles are maybe not open access.
A Private Key Management Scheme
2009 WASE International Conference on Information Engineering, 2009A safety private key management scheme ispresent in this paper. It uses an online assistantserver to cooperates with user device to performprivate key operation. And a light-weightbidirectional authentication is used beforepublic key algorithm that can avoid Denial ofService attack. Our scheme was more suitablefor private key operation in frequency.
Huming Gao, Xin Lv
openaire +1 more source
Public and Private Key Cryptography
2021Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
openaire +1 more source
Oblivious Key-Value Stores and Amplification for Private Set Intersection
IACR Cryptology ePrint Archive, 2021Gayathri Garimella +4 more
semanticscholar +1 more source
Asymmetric Encryption: Public/Private Keys
2019Asymmetric encryption is one of the most important advances in cryptographic security ever made. It underpins all of the security on the Web, in your Wi-Fi connections, and in secure email and other communication of all kinds. It is ubiquitous, but it is also subtle and easy to implement or use incorrectly, and a lack of correctness means a sometimes ...
Seth James Nielson +1 more
openaire +1 more source
Decoy-state method for quantum-key-distribution-based quantum private query
Science China Physics Mechanics and Astronomy, 2022B. Liu +5 more
semanticscholar +1 more source
Encoding Private Key in Fingerprint
2005Electronic transactions require secure electronic signature techniques, which can provide the authentication of the signing individual, non-repudiation of the signature and protection of the integrity of the document using strong cryptographic methods.
Ernő Jeges +2 more
openaire +1 more source
Registration-Based Encryption: Removing Private-Key Generator from IBE
IACR Cryptology ePrint Archive, 2018Sanjam Garg +3 more
semanticscholar +1 more source
From Minicrypt to Obfustopia via Private-Key Functional Encryption
Journal of Cryptology, 2017Ilan Komargodski, Gil Segev
semanticscholar +1 more source
Public-key quantum digital signature scheme with one-time pad private-key
Quantum Information Processing, 2017Feng-Lin Chen +3 more
semanticscholar +1 more source

