Results 271 to 280 of about 535,713 (347)
Subsets of groups in public-key cryptography
André Carvalho, António Malheiro
openalex +1 more source
Bio-inspired cryptography based on proteinoid assemblies. [PDF]
Mougkogiannis P, Ghadafi E, Adamatzky A.
europepmc +1 more source
Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security. [PDF]
Kumar A, Singh P, Kamble DP, Singh I.
europepmc +1 more source
Public-key cryptography architectures:performance and robustness evaluation
Guilherme Perin
openalex +1 more source
BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]
Khan AN +5 more
europepmc +1 more source
Linearity Measures for Multivariate Public Key Cryptography
Simona Samardjiska, Danilo Gligoroski
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2002
The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography.
Hans Delfs, Helmut Knebl
semanticscholar +4 more sources
The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography.
Hans Delfs, Helmut Knebl
semanticscholar +4 more sources
Activation of LoRaWAN End Devices by Using Public Key Cryptography
Cyber Security in Networking Conference, 2020This paper aims to design a new process to assign root keys to the devices in Long Range Wide Area Network (LoRaWAN) by using Public Key Cryptography (PKC). This process is used to propose a new activation method called Public Key Over the Air Activation
Fredrik Mårlind, I. Butun
semanticscholar +1 more source
2021
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala +2 more
openaire +1 more source
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala +2 more
openaire +1 more source

