Results 251 to 260 of about 573,752 (297)
Some of the next articles are maybe not open access.
Public key versus symmetric key cryptography in client–server authentication protocols
International Journal of Information Security, 2021An Braeken
semanticscholar +1 more source
2010
In this chapter, we will explore some computational aspects of modular arithmetic, which we studied in Chapter 6. We will be concerned about how to compute certain numbers in a most efficient way. There is a whole field at work here, of which we barely scratch the surface, called computational complexity.
Matthias Beck, Ross Geoghegan
openaire +1 more source
In this chapter, we will explore some computational aspects of modular arithmetic, which we studied in Chapter 6. We will be concerned about how to compute certain numbers in a most efficient way. There is a whole field at work here, of which we barely scratch the surface, called computational complexity.
Matthias Beck, Ross Geoghegan
openaire +1 more source
2018
In this short chapter, we talk a bit about cryptography. First, we discuss some classical sorts of private key methods, and their limitations in the modern world. We then look at the first public key cryptographic method.
openaire +1 more source
In this short chapter, we talk a bit about cryptography. First, we discuss some classical sorts of private key methods, and their limitations in the modern world. We then look at the first public key cryptographic method.
openaire +1 more source
Computer, 1996
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt a message, which can then itself be decrypted by anyone possessing the public key. Digital signatures can play a role in many activities that do not require secrecy but require sender authentication and guaranteed message ...
openaire +1 more source
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt a message, which can then itself be decrypted by anyone possessing the public key. Digital signatures can play a role in many activities that do not require secrecy but require sender authentication and guaranteed message ...
openaire +1 more source
Secure Healthcare Framework Using Blockchain and Public Key Cryptography
Blockchain Cybersecurity, Trust and Privacy, 2020Randhir Kumar, Rakesh Tripathi
semanticscholar +1 more source
An efficient certificateless public key cryptography with authorized equality test in IIoT
Journal of Ambient Intelligence and Humanized Computing, 2019Rashad Elhabob +3 more
semanticscholar +1 more source
Secure limitation analysis of public-key cryptography for smart card settings
World wide web (Bussum), 2019Youliang Tian +3 more
semanticscholar +1 more source
Public-Key Cryptography in the Fine-Grained Setting
IACR Cryptology ePrint Archive, 2019R. LaVigne +2 more
semanticscholar +1 more source

