Results 31 to 40 of about 319,858 (317)

First end‐to‐end PQC protected DPU‐to‐DPU communications

open access: yesElectronics Letters, 2023
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera   +4 more
doaj   +1 more source

Removable Weak Keys for Discrete Logarithm Based Cryptography [PDF]

open access: yesJournal of Cryptographic Engineering 2020, 2020
We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm based public-key cryptosystem set in a group of prime order $p$ where $p-1$ has small divisors. Unlike the weak private keys based on \textit{numerical size} (such as smaller private keys, or private keys lying in an interval) that will \textit{always ...
arxiv   +1 more source

Domestic clustered networks and internationalization of agrifood SMEs

open access: yesAgribusiness, Volume 39, Issue 1, Page 167-195, Winter 2023., 2023
Abstract This paper examines how participating in domestic clustered networks in the agri‐food industry affects the export status and export intensity of small and medium‐sized enterprises (SMEs). The Uppsala internationalization process model has been revisited in light of the knowledge that these networks can contribute to promoting the presence of ...
Raul Serrano   +5 more
wiley   +1 more source

Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem

open access: yesEmerging Science Journal, 2021
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC).
Maitri Patel, Rajan Patel
doaj   +1 more source

Quantum asymmetric key crypto scheme using Grover iteration

open access: yesScientific Reports, 2023
Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside ...
Chun Seok Yoon   +4 more
doaj   +1 more source

Enhancement of Security of Diffie-Hellman Key Exchange Protocol using RSA Cryptography.

open access: yesJournal of Physics: Conference Series, 2022
Cryptography is related and referred to as the secured transmission of messages amongst the sender and the intended receiver by ensuring confidentiality, integrity, and authentication. Diffie – Hellman (DH) key exchange protocol is a well-known algorithm
Chiradeep Gupta, Subba Reddy
semanticscholar   +1 more source

Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography [PDF]

open access: yesEntropy, 2020
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, C. Lim
semanticscholar   +1 more source

Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj   +1 more source

Arabic Text Encryption Using Artificial Neural Networks [PDF]

open access: yesEngineering and Technology Journal, 2016
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj   +1 more source

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

open access: yesApplied Sciences, 2021
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy