Results 161 to 170 of about 219,404 (221)

Reconfigurable instruction interface architecture for private-key cryptography on the Altera Nios-II processor

open access: closedAdvanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05), 2005
This paper documents the development of a generic interface between the Altera Nios-II FPGA based soft-processor and a private key encryption core implementation. An existing AES encryption core was used for evaluation purposes. It was found that there was an overhead, relative to the time taken for the test encryption core, of between 40.0% and 72.7 ...
P. A. Moore, M. McLoone, Sakir Sezer
openalex   +3 more sources

Private-Key Error Correcting Cryptography Based on QC-LDPC Codes for Telemetry System

open access: closed, 2014
Aiming at the security and reliability of data transmission in a wireless telemetry system, a new error correcting cryptography algorithm is proposed in this paper. The novel algorithm employs quasi-cyclic low-density parity-check (QC-LDPC) codes for simultaneous encryption and channel encoding, which is different from the traditional concatenated ...
Jinrong Zhang   +3 more
openalex   +3 more sources

Blockchain-based Distributed Identity Cryptography Key Management

International Conference on Computer Research and Development, 2023
The identity-based cryptography algorithm SM9 requires a trusted third-party key generation center KGC to generate the user's private key. This will bring the risks and problems of key escrow and single point failure.
Yanyan Yu   +5 more
semanticscholar   +1 more source

A Novel Approach of Symmetric Key Cryptography

2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 2021
Cryptography plays an important role in secured data communication over the network using unknown, untrusted mediums. In the fast digital transformation, traffic on network increasing rapidly where users are always connected, being online, anytime ...
Sanjeev Kumar   +3 more
semanticscholar   +1 more source

An introduction to classic Cryptography, with an exposition of the mathematics for private and public key ciphers,

open access: closed, 2018
Cryptography concerns the principles, protocols, and methods for protecting information against deliberate alteration. For millennia, cryptography was mainly used in diplomacy and military affairs, but cryptographic techniques have recently also been introduced into the bureaucratic, managerial, and economic sides of civil life, and they have been ...
Michele Elia
openalex   +2 more sources

Enhancing Public Key Cryptography using RSA, RSA-CRT and N-Prime RSA with Multiple Keys

2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021
Nowadays, the transmission of private statistics through the computer network needs protection. In a broad range of services, protection is equally troubling.
K. Pavani, P. Sriramya
semanticscholar   +1 more source

A new approach of classical Hill Cipher in public key cryptography

, 2021
Secure message transformation promote the creation of various cryptography systems to enable re￾ceivers to interpret the transformed information. In the present age of information technology, the secure transfer of information is the main study of most ...
Rajaa K. Hasoun   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy