Results 11 to 20 of about 60,860 (288)

PROTECTION OF KEY IN PRIVATE KEY CRYPTOGRAPHY. [PDF]

open access: hybridInternational Journal of Advanced Research, 2017
Neha Tyagi   +4 more
openalex   +3 more sources

On the Impossibility of Private Key Cryptography with Weakly Random Keys [PDF]

open access: closed, 2007
The properties of weak sources of randomness have been investigated in many contexts and using several models of weakly random behaviour. For two such models, developed by Santha and Vazirani, and Chor and Goldreich, it is known that the output from one such source cannot be "compressed" to produce nearly random bits.
James McInnes, Benny Pinkas
openalex   +3 more sources

Distributed Private-Key Generators for Identity-Based Cryptography [PDF]

open access: closed, 2010
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Aniket Kate, Ian Goldberg
openalex   +2 more sources

Enhancing IoT security with a DNA-based lightweight cryptography system [PDF]

open access: yesScientific Reports
The rapid increase of internet of things (IoT) devices in our daily lives has highlighted the critical need for strong security measures to protect the integrity and confidentiality of IoT communications.
Sehrish Aqeel   +4 more
doaj   +2 more sources

Secure, Image based Private Key for Secret Message Cryptography

open access: goldInternational Journal of Computer Applications, 2021
Ziad Alqadi   +2 more
openalex   +2 more sources

Increasing the security of transmitted text messages using chaotic key and image key cryptography [PDF]

open access: yesInternational Journal of Data and Network Science, 2023
It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size.
Mua’ad Abu-Faraj   +4 more
doaj   +1 more source

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

Fault attacks on authenticated encryption modes for GIFT

open access: yesIET Information Security, 2022
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj   +1 more source

Home - About - Disclaimer - Privacy