Results 241 to 250 of about 573,752 (297)
Some of the next articles are maybe not open access.

Public Key Cryptography

2021
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala   +2 more
openaire   +1 more source

Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography

Journal of Network and Computer Applications, 2019
Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous mutual authentication protocol needs to be developed for complex 5G networks.
Bidi Ying, A. Nayak
semanticscholar   +1 more source

Public-Key Cryptography

2005
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).
  +7 more sources

Solving the security challenges of IoT with public key cryptography

Network Security, 2019
With the Internet of Things (IoT) predicted to connect 20 billion devices by 2020, there is a strong case to be made for the adoption of identity-based public key cryptography to provide end-to-end security of data across IoT-enabled industries.
R. Hodgson
semanticscholar   +1 more source

Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography

IEEE Transactions on Emerging Topics in Computing, 2023
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto   +4 more
semanticscholar   +1 more source

Public-Key Cryptography

Abstract The basic idea of public-key cryptography as a means for two untrusting parties to establish secure communication is outlined. The use of public-key cryptography to establish a key for a symmetric cryptosystem by using a protocol such as the Diffie-Hellman protocol or quantum key distribution (QKD) is explained. Two major public-
Eric L. F. Roettger, Hugh C. Williams
  +4 more sources

Public Key Cryptography

AT&T Technical Journal, 1994
This article explains public key cryptography, its benefits and limitations.
openaire   +1 more source

A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications

IEEE transactions on intelligent transportation systems (Print), 2022
Basic security requirements such as confidentiality, user authentication and data integrity, are assured by using public-key cryptography (PKC). In particular, public-key signature schemes provide non-repudiation, integrity of transmitted messages and ...
Kyung-Ah Shim
semanticscholar   +1 more source

Public-Key Cryptography

2009
This chapter contains sections titled: Introduction This chapter contains sections titled: Cryptosystems and Cryptanalysis Key Management Digital Signatures and Hash Functions Examples of Public Key Systems and Hash Functions Implementations of Public Key Cryptography A Sample Proposal for a LAN ...
openaire   +2 more sources

Public-Key Cryptography

2003
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For most security properties, it is computational security that has to be considered: an attack scenario describes how adversaries interact with the cryptosystem, trying to attack it; the system can be called secure if adversaries with reasonably bounded ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy