Results 261 to 270 of about 573,752 (297)
Some of the next articles are maybe not open access.
The Complexity of Public-Key Cryptography
Tutorials on the Foundations of Cryptography, 2017B. Barak
semanticscholar +1 more source
1993
This paper deals with public key cryptosystems and some of their applications such as password encryption and digital signatures. The necessary mathematical background is also provided.
openaire +1 more source
This paper deals with public key cryptosystems and some of their applications such as password encryption and digital signatures. The necessary mathematical background is also provided.
openaire +1 more source
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
IACR Cryptology ePrint Archive, 2019M. Naehrig, Joost Renes
semanticscholar +1 more source
Energy analysis of public-key cryptography for wireless sensor networks
Third IEEE International Conference on Pervasive Computing and Communications, 2005A. Wander +4 more
semanticscholar +1 more source
Image encryption and decryption in public key cryptography based on MR
International Conference on Computing and Convergence Technology, 2015Hiral Rathod, M. S. Sisodia, A. Reddy
semanticscholar +1 more source

