Results 1 to 10 of about 1,467 (91)

Public-key cryptography and invariant theory [PDF]

open access: greenJournal of Mathematical Sciences, 2005
Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of the known cryptosystems which involve groups.
Dima Grigoriev
openalex   +7 more sources

Public key cryptography [PDF]

open access: bronzeXRDS: Crossroads, The ACM Magazine for Students, 2000
P. Mohapatra
openalex   +3 more sources

Probability theory and public-key cryptography [PDF]

open access: yesInternational Journal of Computer Mathematics: Computer Systems Theory, 2020
In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.
Bessonov, Mariya   +2 more
openaire   +4 more sources

Public Key Cryptography [PDF]

open access: yesJournal of Physics: Conference Series, 2020
Abstract Public Key Cryptography is a software model that presents the process of encoding information, in this case the documents contained in a file. The encoding process begins by determining the master file or document that is ready to be encoded, then by applying the combination method, shifting and implementing the pass phrase to ...
openaire   +1 more source

Joint Operation in Public Key Cryptography [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2013
We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become interested in cryptography. We believe that the encoding of cryptographic algorithms is an important step in that direction, and it is the
Dragan Vidakovic   +3 more
openaire   +3 more sources

Thompson’s Group and Public Key Cryptography [PDF]

open access: yes, 2005
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established protocols based on numeric computation. Notably, the protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al.
Vladimir Shpilrain, Alexander Ushakov
openaire   +3 more sources

On the Cryptanalysis of Public-Key Cryptography [PDF]

open access: yes, 2012
Nowadays, the most popular public-key cryptosystems are based on either the integer factorization or the discrete logarithm problem. The feasibility of solving these mathematical problems in practice is studied and techniques are presented to speed-up the underlying arithmetic on parallel architectures.
openaire   +2 more sources

Certificateless Public Key Cryptography [PDF]

open access: yes, 2003
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an
Kenneth G. Paterson, Sattam S. Al-Riyami
openaire   +2 more sources

Home - About - Disclaimer - Privacy