Results 231 to 240 of about 61,999 (289)
Certificateless aggregate signcryption scheme with multi-ciphertext equality test for the internet of vehicles. [PDF]
Yang X, Luo X, Liu R, Li S, Yao K.
europepmc +1 more source
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications. [PDF]
Kamal A +3 more
europepmc +1 more source
The special algorithm based on RSA cryptography for signing and verifying digital signature. [PDF]
Somsuk K.
europepmc +1 more source
Quantum-safe hybrid key exchanges with KEM-based authentication. [PDF]
Battarbee C +4 more
europepmc +1 more source
SecureEdge-MedChain: A Post-Quantum Blockchain and Federated Learning Framework for Real-Time Predictive Diagnostics in IoMT. [PDF]
Ravisankar S, Maheswar R.
europepmc +1 more source
Forward-Security in Private-Key Cryptography [PDF]
This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area.
Mihir Bellare, Bennet Yee
core +5 more sources
Post Quantum Public and Private Key Cryptography Optimized for IoT Security
The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by ...
Ajay Kaushik +8 more
openalex +3 more sources
Public and Private Key Cryptography
Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
Hong Zhou
openalex +2 more sources

