Results 91 to 100 of about 219,404 (221)

Asynchronous distributed private-key generators for identity-based cryptography [PDF]

open access: yes
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages over the Internet. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can ...
Aniket Kate, Ian Goldberg
core  

CASDC: A Cryptographically Secure Data System Based on Two Private Key Images

open access: gold, 2022
Mua’ad Abu-Faraj   +4 more
openalex   +1 more source

Model for cryptography protection of confidential information [PDF]

open access: yes, 2018
УДК 004.056 Борсуковський Ю.В., Борсуковська В.Ю. Модель криптографічного захисту конфіденційної інформації В даній статті проведено детальний аналіз вимог щодо формування моделі криптографічного захисту конфіденційної інформації.
Борсуковська, Вікторія Юріївна   +1 more
core  

Hybrid Cryptography for Random-key Generation based on ECC Algorithm

open access: yes, 2017
As more increase in usage of communications and developing them more user friendly. While developing those communications, we need to take care of security and safety of user’s data.
P. Gayathri   +5 more
semanticscholar   +1 more source

Breaking the Hidden Irreducible Polynomials Scheme [PDF]

open access: yes, 2019
In 2019 G\'omez described a new public key cryptography scheme based on ideas from multivariate public key cryptography using hidden irreducible polynomials.
Eder, Christian
core   +1 more source

Enhancing Image Cryptography Performance with Block Left Rotation Operations

open access: yesApplied Computational Intelligence and Soft Computing
In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages
M. Al-batah   +3 more
semanticscholar   +1 more source

Implementation of Italian industry 4.0 quantum testbed in Turin

open access: yesIET Quantum Communication
The security of data communications is one of the crucial challenges that our society is facing today. Quantum Key Distribution (QKD) is one of the most prominent methods for guaranteeing ultimate security based on the laws of quantum physics.
Nicola Corrias   +17 more
doaj   +1 more source

Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the session
Vlad-Florin Drăgoi   +4 more
doaj   +1 more source

THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2011
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj   +1 more source

Boson Sampling Private-Key Quantum Cryptography [PDF]

open access: yes
We introduce a quantum private-key encryption protocol based on multi-photon interference in linear optics networks. The scheme builds upon Boson Sampling, and we show that it is hard to break, even for a quantum computer.
Berry, DW   +5 more
core  

Home - About - Disclaimer - Privacy