Results 31 to 40 of about 219,404 (221)

Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem

open access: yesEmerging Science Journal, 2021
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC).
Maitri Patel, Rajan Patel
doaj   +1 more source

Quantum asymmetric key crypto scheme using Grover iteration

open access: yesScientific Reports, 2023
Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside ...
Chun Seok Yoon   +4 more
doaj   +1 more source

Enhancement of Security of Diffie-Hellman Key Exchange Protocol using RSA Cryptography.

open access: yesJournal of Physics: Conference Series, 2022
Cryptography is related and referred to as the secured transmission of messages amongst the sender and the intended receiver by ensuring confidentiality, integrity, and authentication. Diffie – Hellman (DH) key exchange protocol is a well-known algorithm
Chiradeep Gupta, Subba Reddy
semanticscholar   +1 more source

Quantum Cryptography in Practice [PDF]

open access: yes, 2003
BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks.
Elliott, Chip   +2 more
core   +2 more sources

Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography [PDF]

open access: yesEntropy, 2020
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, C. Lim
semanticscholar   +1 more source

Arabic Text Encryption Using Artificial Neural Networks [PDF]

open access: yesEngineering and Technology Journal, 2016
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj   +1 more source

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

open access: yesApplied Sciences, 2021
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou   +8 more
doaj   +1 more source

Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks

open access: yesIEEE Access, 2019
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography ...
Jui-Di Wu   +3 more
doaj   +1 more source

Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj   +1 more source

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

open access: yesIACR Cryptology ePrint Archive, 2020
. Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years,
Yudi Zhang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy