Results 151 to 160 of about 219,404 (221)
RiceChain-Plus: an enhanced framework for blockchain-based rice supply chain systems-ensuring security, privacy, and efficiency. [PDF]
Yakubu BM+2 more
europepmc +1 more source
Low latency FPGA implementation of twisted Edward curve cryptography hardware accelerator over prime field. [PDF]
Hossain MR+7 more
europepmc +1 more source
Accelerating private-key cryptography via multithreading on symmetric multiprocessors [PDF]
Achieving high performance in cryptographic processing is important due to the increasing connectivity among today's computers. Despite steady improvements in microprocessor and system performance, private-key cipher implementations continue to be slow.
P. Dongara, T. N. Vijaykumar
semanticscholar +3 more sources
Public and Private Key Cryptography
Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
Hong Zhou
semanticscholar +4 more sources
Post Quantum Public and Private Key Cryptography Optimized for IoT Security
The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by ...
Ajay Kaushik+8 more
semanticscholar +4 more sources
Microprocessor architecture for private-key cryptography
A novel generic instructions set for a RISC microprocessor designed to accelerate the performance of all private-key cryptographic algorithms is described in this paper. The RISC microprocessor has coprocessors and instruction extensions designed to specifically implement and accelerate the Rijndael and DES private key algorithms.
Neil Smyth
semanticscholar +4 more sources
Post Quantum Implications on Private and Public Key Cryptography
With the increase in the computing resources power the quantum computers are penetrating into the communication networks. Therefore, assured security of classical cryptographic algorithms is highly questionable and needs inspection.
Seema B. Hegde+2 more
semanticscholar +3 more sources
Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise
A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC.
Cheman Shaik
semanticscholar +4 more sources
Private key and public key quantum cryptography
Summary form only given. Information has always been valuable, never more so than in recent decades, and throughout history people have turned to cryptography in an attempt to keep important information secret. Coherent manipulation of quantum states promises to rearrange the lists of possible and impossible cryptographic tasks.
Daniel Gottesman
openalex +3 more sources