Results 131 to 140 of about 219,404 (221)

An efficient image encryption algorithm using 3D-cyclic chebyshev map and elliptic curve. [PDF]

open access: yesSci Rep
Kanwal S   +5 more
europepmc   +1 more source

Forward-Security in Private-Key Cryptography [PDF]

open access: closedThe Cryptographer's Track at RSA Conference, 2003
This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area.
Mihir Bellare, Bennet Yee
semanticscholar   +7 more sources

Prediction of android ransomware with deep learning model using hybrid cryptography. [PDF]

open access: yesSci Rep
Kalphana KR   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy