Results 231 to 240 of about 61,999 (289)

Quantum-safe hybrid key exchanges with KEM-based authentication. [PDF]

open access: yesEPJ Quantum Technol
Battarbee C   +4 more
europepmc   +1 more source

Forward-Security in Private-Key Cryptography [PDF]

open access: closed, 2003
This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area.
Mihir Bellare, Bennet Yee
core   +5 more sources

Post Quantum Public and Private Key Cryptography Optimized for IoT Security

open access: closedWireless Personal Communications, 2022
The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by ...
Ajay Kaushik   +8 more
openalex   +3 more sources

Public and Private Key Cryptography

open access: closed, 2021
Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
Hong Zhou
openalex   +2 more sources

Home - About - Disclaimer - Privacy