Results 261 to 270 of about 573,752 (297)
Some of the next articles are maybe not open access.

The Complexity of Public-Key Cryptography

Tutorials on the Foundations of Cryptography, 2017
B. Barak
semanticscholar   +1 more source

Public key cryptography

1993
This paper deals with public key cryptosystems and some of their applications such as password encryption and digital signatures. The necessary mathematical background is also provided.
openaire   +1 more source

Energy analysis of public-key cryptography for wireless sensor networks

Third IEEE International Conference on Pervasive Computing and Communications, 2005
A. Wander   +4 more
semanticscholar   +1 more source

Image encryption and decryption in public key cryptography based on MR

International Conference on Computing and Convergence Technology, 2015
Hiral Rathod, M. S. Sisodia, A. Reddy
semanticscholar   +1 more source

Lattice-based Key-sharing Schemes

ACM Computing Surveys, 2022
Prasanna Ravi   +2 more
exaly  

Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC)

Wireless personal communications, 2014
I. Memon   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy