Results 31 to 40 of about 319,858 (317)
First end‐to‐end PQC protected DPU‐to‐DPU communications
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera+4 more
doaj +1 more source
Removable Weak Keys for Discrete Logarithm Based Cryptography [PDF]
We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm based public-key cryptosystem set in a group of prime order $p$ where $p-1$ has small divisors. Unlike the weak private keys based on \textit{numerical size} (such as smaller private keys, or private keys lying in an interval) that will \textit{always ...
arxiv +1 more source
Domestic clustered networks and internationalization of agrifood SMEs
Abstract This paper examines how participating in domestic clustered networks in the agri‐food industry affects the export status and export intensity of small and medium‐sized enterprises (SMEs). The Uppsala internationalization process model has been revisited in light of the knowledge that these networks can contribute to promoting the presence of ...
Raul Serrano+5 more
wiley +1 more source
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC).
Maitri Patel, Rajan Patel
doaj +1 more source
Quantum asymmetric key crypto scheme using Grover iteration
Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside ...
Chun Seok Yoon+4 more
doaj +1 more source
Enhancement of Security of Diffie-Hellman Key Exchange Protocol using RSA Cryptography.
Cryptography is related and referred to as the secured transmission of messages amongst the sender and the intended receiver by ensuring confidentiality, integrity, and authentication. Diffie – Hellman (DH) key exchange protocol is a well-known algorithm
Chiradeep Gupta, Subba Reddy
semanticscholar +1 more source
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography [PDF]
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, C. Lim
semanticscholar +1 more source
Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj +1 more source
Arabic Text Encryption Using Artificial Neural Networks [PDF]
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj +1 more source
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou+8 more
doaj +1 more source