Results 41 to 50 of about 319,858 (317)

Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks

open access: yesIEEE Access, 2019
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography ...
Jui-Di Wu   +3 more
doaj   +1 more source

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

open access: yesIACR Cryptology ePrint Archive, 2020
. Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years,
Yudi Zhang   +4 more
semanticscholar   +1 more source

A Practical Analysis of the Fermat Factorization and Pollard Rho Method for Factoring Integers

open access: yesLontar Komputer, 2021
The development of public-key cryptography generation using the factoring method is very important in practical cryptography applications. In cryptographic applications, the urgency of factoring is very risky because factoring can crack public and ...
Aminudin Aminudin, Eko Budi Cahyono
doaj   +1 more source

Facilitating connection to enhance college student well‐being: Evaluation of an experiential group program

open access: yesAmerican Journal of Community Psychology, Volume 70, Issue 3-4, Page 314-326, December 2022., 2022
Abstract This randomized controlled trial examined the impact of The Connection Project, an experiential, relationship‐focused intervention designed to improve school belongingness and decrease symptoms of depression and loneliness among new college students.
Meghan A. Costello   +6 more
wiley   +1 more source

Key Generation Using Generalized Pell’s Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis

open access: yesCybernetics and Information Technologies, 2020
RSA is one among the most popular public key cryptographic algorithm for security systems. It is explored in the results that RSA is prone to factorization problem, since it is sharing common modulus and public key exponent.
K. Raghunandan   +3 more
semanticscholar   +1 more source

Implementation beyond the clinic: Community‐driven utilization of research evidence from PC CARES, a suicide prevention program

open access: yesAmerican Journal of Community Psychology, Volume 70, Issue 3-4, Page 365-378, December 2022., 2022
Abstract While implementation and dissemination of research is a rapidly growing area, critical questions remain about how, why, and under what conditions everyday people integrate and utilize research evidence. This mixed‐methods study investigates how participants of Promoting Community Conversations About Research to End Suicide (PC CARES) make ...
Lauren A. White   +7 more
wiley   +1 more source

IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesMalaysian Journal of Computing, 2021
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin   +5 more
doaj   +1 more source

New Approach for Encryption Private key for Sender by using Hill Cipher with GGH Cryptography

open access: yes, 2021
One of the important issues in the encryption used in networks is the Hill encryption method, but it is not practical in economic matters or the Internet, It is very difficult to send the private key to the receive in order to decrypt the message, due to the high exposure to third-party attacks, and therefore it is recommended that the private key must
Salah AL Bermany, Majeed Ismael Sameer
openaire   +1 more source

Community resilience to crime: A study of the 2011 Brisbane flood

open access: yesAmerican Journal of Community Psychology, Volume 70, Issue 3-4, Page 379-393, December 2022., 2022
Abstract Understanding and enhancing community resilience is a global priority as societies encounter a rising number of extreme weather events. Given that these events are typically both sudden and unexpected, community resilience is typically examined after the disaster so there can be no before and after comparisons.
Rebecca Wickes   +3 more
wiley   +1 more source

Identity-based key-insulated aggregate signature scheme

open access: yesJournal of King Saud University: Computer and Information Sciences, 2017
Private key exposure can be the most devastating attack on cryptographic schemes; as such exposure leads to the breakage of security of the scheme as a whole. In the real world scenario, this problem is perhaps the biggest threat to cryptography.
P. Vasudeva Reddy, P.V.S.S.N. Gopal
doaj   +1 more source

Home - About - Disclaimer - Privacy