Results 161 to 170 of about 219,404 (221)
This paper documents the development of a generic interface between the Altera Nios-II FPGA based soft-processor and a private key encryption core implementation. An existing AES encryption core was used for evaluation purposes. It was found that there was an overhead, relative to the time taken for the test encryption core, of between 40.0% and 72.7 ...
P. A. Moore, M. McLoone, Sakir Sezer
openalex +3 more sources
Private-Key Error Correcting Cryptography Based on QC-LDPC Codes for Telemetry System
Aiming at the security and reliability of data transmission in a wireless telemetry system, a new error correcting cryptography algorithm is proposed in this paper. The novel algorithm employs quasi-cyclic low-density parity-check (QC-LDPC) codes for simultaneous encryption and channel encoding, which is different from the traditional concatenated ...
Jinrong Zhang+3 more
openalex +3 more sources
Private key updating scheme of identity-based public key cryptography under distributed network
Wei Li, Luo Chang-yuan, Xiao Chu
+5 more sources
Emerging Security Solutions Using Public and Private Key Cryptography
openalex +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Blockchain-based Distributed Identity Cryptography Key Management
International Conference on Computer Research and Development, 2023The identity-based cryptography algorithm SM9 requires a trusted third-party key generation center KGC to generate the user's private key. This will bring the risks and problems of key escrow and single point failure.
Yanyan Yu+5 more
semanticscholar +1 more source
A Novel Approach of Symmetric Key Cryptography
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 2021Cryptography plays an important role in secured data communication over the network using unknown, untrusted mediums. In the fast digital transformation, traffic on network increasing rapidly where users are always connected, being online, anytime ...
Sanjeev Kumar+3 more
semanticscholar +1 more source
Cryptography concerns the principles, protocols, and methods for protecting information against deliberate alteration. For millennia, cryptography was mainly used in diplomacy and military affairs, but cryptographic techniques have recently also been introduced into the bureaucratic, managerial, and economic sides of civil life, and they have been ...
Michele Elia
openalex +2 more sources
Enhancing Public Key Cryptography using RSA, RSA-CRT and N-Prime RSA with Multiple Keys
2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021Nowadays, the transmission of private statistics through the computer network needs protection. In a broad range of services, protection is equally troubling.
K. Pavani, P. Sriramya
semanticscholar +1 more source
A new approach of classical Hill Cipher in public key cryptography
, 2021Secure message transformation promote the creation of various cryptography systems to enable receivers to interpret the transformed information. In the present age of information technology, the secure transfer of information is the main study of most ...
Rajaa K. Hasoun+2 more
semanticscholar +1 more source