Results 41 to 50 of about 219,404 (221)

IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesMalaysian Journal of Computing, 2021
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin   +5 more
doaj   +1 more source

A Practical Analysis of the Fermat Factorization and Pollard Rho Method for Factoring Integers

open access: yesLontar Komputer, 2021
The development of public-key cryptography generation using the factoring method is very important in practical cryptography applications. In cryptographic applications, the urgency of factoring is very risky because factoring can crack public and ...
Aminudin Aminudin, Eko Budi Cahyono
doaj   +1 more source

Key Generation Using Generalized Pell’s Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis

open access: yesCybernetics and Information Technologies, 2020
RSA is one among the most popular public key cryptographic algorithm for security systems. It is explored in the results that RSA is prone to factorization problem, since it is sharing common modulus and public key exponent.
K. Raghunandan   +3 more
semanticscholar   +1 more source

Identity-based key-insulated aggregate signature scheme

open access: yesJournal of King Saud University: Computer and Information Sciences, 2017
Private key exposure can be the most devastating attack on cryptographic schemes; as such exposure leads to the breakage of security of the scheme as a whole. In the real world scenario, this problem is perhaps the biggest threat to cryptography.
P. Vasudeva Reddy, P.V.S.S.N. Gopal
doaj   +1 more source

New Approach for Encryption Private key for Sender by using Hill Cipher with GGH Cryptography

open access: yes, 2021
One of the important issues in the encryption used in networks is the Hill encryption method, but it is not practical in economic matters or the Internet, It is very difficult to send the private key to the receive in order to decrypt the message, due to the high exposure to third-party attacks, and therefore it is recommended that the private key must
Salah AL Bermany, Majeed Ismael Sameer
openaire   +1 more source

ESSVCS: an enriched secret sharing visual cryptography [PDF]

open access: yes, 2013
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics.
A. Shamir   +17 more
core   +1 more source

Secure E-Mail System Using S/Mime and Ib-Pkc [PDF]

open access: yesEngineering and Technology Journal, 2007
Although e-mail security solutions have been introduced formore than two decades, most of the e-mail messages are sent nowadayswithout being secured by any of these techniques.
Sufyan Faraj, Mohammed Ibrahem
doaj   +1 more source

How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]

open access: yes, 2005
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core   +2 more sources

SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques.
MOHAMMED T. IBRAHEM, SUFYAN T. FARAJ
doaj   +1 more source

RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext

open access: yesInspiration, 2022
Steganography is the art and science of writing hidden messages or hiding messages in such a way that, apart from the sender and the recipient, no one knows or is aware that there is a secret message (it does not appear that there is a hidden message ...
Hari Murti   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy