Results 1 to 10 of about 319,858 (317)

Novel Hybrid Public/Private Key Cryptography Based on Perfect Gaussian Integer Sequences [PDF]

open access: goldIEEE Access, 2021
This paper proposes a novel hybrid public/private key cryptography scheme based on perfect Gaussian integer sequences (PGISs) of period $N=pq$ . First, a review study of construction degree-4 PGIS is addressed.
Ching-Hsien Hsia   +3 more
doaj   +5 more sources

A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography [PDF]

open access: goldSymmetry, 2022
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process. In addition, they use private keys of a specific length, in addition to the fixed length of the data block used in ...
Mua’ad Abu-Faraj   +2 more
semanticscholar   +3 more sources

PROTECTION OF KEY IN PRIVATE KEY CRYPTOGRAPHY. [PDF]

open access: hybridInternational Journal of Advanced Research, 2017
Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg and Shudhanshu Yadav G.L. Bajaj Institute of Technology & Management, Plot 2, Knowledge Park 3, Greater Noida, Distt. Gautam Budh Nagar, Uttar Pradesh, India.
Shubham Garg   +4 more
semanticscholar   +4 more sources

COMPARATIVE STUDY OF PRIVATE AND PUBLIC KEY CRYPTOGRAPHY ALGORITHMS: A SURVEY [PDF]

open access: bronzeInternational Journal of Research in Engineering and Technology, 2014
Internet has revolutionized many aspects of our daily lives. Nowadays Internet is used for millions of applications. Many people depend on Internet for several activities like on-line banking, on-line shopping, on-line learning and on-line meetings etc. Huge amount of data travels over the network. Security of data over the network is a critical issue.
Priti Bali .
semanticscholar   +3 more sources

A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes

open access: hybridJournal of Software Engineering and Applications, 2017
Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed.
Randa A. Al-Dallah   +4 more
semanticscholar   +5 more sources

Methods for Protection of Key in Private Key Cryptography [PDF]

open access: bronzeInternational Journal of Innovative Research in Computer Science & Technology, 2017
Shubham Garg   +4 more
semanticscholar   +4 more sources

Public-Key Cryptography Standards (PKCS) #8: Private-Key Information Syntax Specification Version 1.2 [PDF]

open access: closedRequest for Comments, 2008
This document represents a republication of PKCS #8 v1.2 from RSA Laboratories' Public Key Cryptography Standard (PKCS) series. Change control is transferred to the IETF. The body of this document, except for the security considerations section, is taken
B. Kaliski
semanticscholar   +3 more sources

On the Impossibility of Private Key Cryptography with Weakly Random Keys [PDF]

open access: closedAnnual International Cryptology Conference, 2007
The properties of weak sources of randomness have been investigated in many contexts and using several models of weakly random behaviour. For two such models, developed by Santha and Vazirani, and Chor and Goldreich, it is known that the output from one such source cannot be "compressed" to produce nearly random bits.
Benny Pinkas, James L. McInnes
semanticscholar   +4 more sources

A biometrics-generated private/public key cryptography for a blockchain-based e-voting system

open access: goldEgyptian Informatics Journal
Voting aims to provide the best decision or select the most selected option for the largest group of voters. Malicious parties gaining access, and otherwise tampering with election results, or the votes make this effort counterproductive.
Jide Kehinde Adeniyi   +6 more
doaj   +3 more sources

Distributed Private-Key Generators for Identity-Based Cryptography [PDF]

open access: closedInternational Conference on Security and Cryptography for Networks, 2010
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Ian Goldberg, Aniket Kate
semanticscholar   +3 more sources

Home - About - Disclaimer - Privacy