Results 211 to 220 of about 3,565 (253)

Post Quantum Public and Private Key Cryptography Optimized for IoT Security

Wireless Personal Communications, 2022
The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by ...
Ajay Kaushik   +8 more
openaire   +2 more sources

Public and Private Key Cryptography

2021
Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
openaire   +1 more source

Private key and public key quantum cryptography

Summaries of Papers Presented at the Quantum Electronics and Laser Science Conference, 2003
Summary form only given. Information has always been valuable, never more so than in recent decades, and throughout history people have turned to cryptography in an attempt to keep important information secret. Coherent manipulation of quantum states promises to rearrange the lists of possible and impossible cryptographic tasks.
openaire   +1 more source

Accelerating private-key cryptography via multithreading on symmetric multiprocessors

2003 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS 2003., 2003
Achieving high performance in cryptographic processing is important due to the increasing connectivity among today's computers. Despite steady improvements in microprocessor and system performance, private-key cipher implementations continue to be slow.
P. Dongara, T.N. Vijaykumar
openaire   +1 more source

Forward-Security in Private-Key Cryptography

2003
This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area.
Mihir Bellare, Bennet Yee
openaire   +1 more source

Authenticated key agreement protocol for virtual private network based on certificateless cryptography

2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer Eldewahi, Eihab Basheir
openaire   +1 more source

Distributed Private-Key Generators for Identity-Based Cryptography

2010
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Aniket Kate, Ian Goldberg
openaire   +1 more source

Home - About - Disclaimer - Privacy