Results 121 to 130 of about 3,313 (171)
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area.
Mihir Bellare, Bennet Yee
openaire +3 more sources
Post Quantum Public and Private Key Cryptography Optimized for IoT Security
The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by ...
Ajay Kaushik +8 more
openaire +3 more sources
Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise
A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC.
Cheman Shaik
openaire +3 more sources
This paper documents the development of a generic interface between the Altera Nios-II FPGA based soft-processor and a private key encryption core implementation. An existing AES encryption core was used for evaluation purposes. It was found that there was an overhead, relative to the time taken for the test encryption core, of between 40.0% and 72.7 ...
P. Moore, Sakir Sezer, M. McLoone
openaire +3 more sources
Private-Key Error Correcting Cryptography Based on QC-LDPC Codes for Telemetry System
Aiming at the security and reliability of data transmission in a wireless telemetry system, a new error correcting cryptography algorithm is proposed in this paper. The novel algorithm employs quasi-cyclic low-density parity-check (QC-LDPC) codes for simultaneous encryption and channel encoding, which is different from the traditional concatenated ...
Jinrong Zhang +3 more
openaire +3 more sources
Private key updating scheme of identity-based public key cryptography under distributed network
Chang-yuan Luo, Wei Li, Xiao Chu
+5 more sources
Post Quantum Implications on Private and Public Key Cryptography
Seema B. Hegde +2 more
openaire +2 more sources
Cryptography concerns the principles, protocols, and methods for protecting information against deliberate alteration. For millennia, cryptography was mainly used in diplomacy and military affairs, but cryptographic techniques have recently also been introduced into the bureaucratic, managerial, and economic sides of civil life, and they have been ...
Michele Elia
openaire +2 more sources
Jie Zhang, Futai Zhang, Xinyi Huang
openaire +2 more sources

