Results 121 to 130 of about 3,313 (171)

Forward-Security in Private-Key Cryptography

open access: closed, 2003
This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area.
Mihir Bellare, Bennet Yee
openaire   +3 more sources

Post Quantum Public and Private Key Cryptography Optimized for IoT Security

open access: closedWireless Personal Communications, 2022
The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by ...
Ajay Kaushik   +8 more
openaire   +3 more sources

Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

open access: closed, 2007
A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC.
Cheman Shaik
openaire   +3 more sources

Reconfigurable instruction interface architecture for private-key cryptography on the Altera Nios-II processor

open access: closedAdvanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05), 2005
This paper documents the development of a generic interface between the Altera Nios-II FPGA based soft-processor and a private key encryption core implementation. An existing AES encryption core was used for evaluation purposes. It was found that there was an overhead, relative to the time taken for the test encryption core, of between 40.0% and 72.7 ...
P. Moore, Sakir Sezer, M. McLoone
openaire   +3 more sources

Private-Key Error Correcting Cryptography Based on QC-LDPC Codes for Telemetry System

open access: closed, 2014
Aiming at the security and reliability of data transmission in a wireless telemetry system, a new error correcting cryptography algorithm is proposed in this paper. The novel algorithm employs quasi-cyclic low-density parity-check (QC-LDPC) codes for simultaneous encryption and channel encoding, which is different from the traditional concatenated ...
Jinrong Zhang   +3 more
openaire   +3 more sources

Post Quantum Implications on Private and Public Key Cryptography

open access: closed2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES), 2023
Seema B. Hegde   +2 more
openaire   +2 more sources

An introduction to classic Cryptography, with an exposition of the mathematics for private and public key ciphers,

open access: closed, 2018
Cryptography concerns the principles, protocols, and methods for protecting information against deliberate alteration. For millennia, cryptography was mainly used in diplomacy and military affairs, but cryptographic techniques have recently also been introduced into the bureaucratic, managerial, and economic sides of civil life, and they have been ...
Michele Elia
openaire   +2 more sources

Home - About - Disclaimer - Privacy