Results 31 to 40 of about 219,404 (221)
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC).
Maitri Patel, Rajan Patel
doaj +1 more source
Quantum asymmetric key crypto scheme using Grover iteration
Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside ...
Chun Seok Yoon+4 more
doaj +1 more source
Enhancement of Security of Diffie-Hellman Key Exchange Protocol using RSA Cryptography.
Cryptography is related and referred to as the secured transmission of messages amongst the sender and the intended receiver by ensuring confidentiality, integrity, and authentication. Diffie – Hellman (DH) key exchange protocol is a well-known algorithm
Chiradeep Gupta, Subba Reddy
semanticscholar +1 more source
Quantum Cryptography in Practice [PDF]
BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks.
Elliott, Chip+2 more
core +2 more sources
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography [PDF]
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, C. Lim
semanticscholar +1 more source
Arabic Text Encryption Using Artificial Neural Networks [PDF]
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj +1 more source
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou+8 more
doaj +1 more source
Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography ...
Jui-Di Wu+3 more
doaj +1 more source
Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj +1 more source
. Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years,
Yudi Zhang+4 more
semanticscholar +1 more source