Results 171 to 180 of about 219,404 (221)

Reversible Data Hiding in Encrypted Images with Private Key Cryptography [PDF]

open access: closed, 2017
Volume 7 Issue 11 (November ...
Wajahath Hussain Razvi, Ch. Samson
openalex   +1 more source

Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

IEEE Transactions on Dependable and Secure Computing, 2020
Mobile device and application (app) security are increasingly important, partly due to the constant and fast-paced cyberthreat evolution. To ensure the security of communication (e.g., data-in-transit), a number of identity-based signature schemes have ...
De-biao He   +3 more
semanticscholar   +1 more source

Authenticated key agreement protocol for virtual private network based on certificateless cryptography

2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer E. W. Eldewahi, Eihab Basheir
openaire   +2 more sources

Introduction to Modern Cryptography

, 2020
Preface I. Introduction and Classical Cryptography Introduction Cryptography and Modern Cryptography The Setting of Private-Key Encryption Historical Ciphers and Their Cryptanalysis Principles of Modern Cryptography Principle 1 - Formal Definitions ...
Jonathan Katz, Yehuda Lindell
semanticscholar   +1 more source

Certificateless Public Key Cryptography in the Standard Model

Fundamenta Informaticae, 2018
Identity-based cryptography has been introduced by Shamir at Crypto’84 to avoid the use of expensive certificates in certified public key cryptography. In such system, the identity becomes the public key and each user needs to interact with a designated ...
Sébastien Canard, V. Trinh
semanticscholar   +1 more source

Circulant UOV: a new UOV variant with shorter private key and faster signature generation

KSII Transactions on Internet and Information Systems, 2018
UOV is one of the most important signature schemes in Multivariate Public Key Cryptography (MPKC). It has a strong security guarantee and is considered to be quantum-resistant.
Zhiniang Peng, Shaohua Tang
semanticscholar   +1 more source

Asymmetric Key Cryptography

, 2014
The term cryptography comes from the two Greek word skrupto and Graph which mean secret and writing. Cryptography is the process of disguising the messages which can only be read by sender and receiver.
A. Panwar
semanticscholar   +1 more source

Renewable energy public–private partnerships in developing countries: Determinants of private investment

Sustainable Development, 2021
Jorge Fleta-asín   +2 more
exaly  

Home - About - Disclaimer - Privacy