Results 281 to 290 of about 535,713 (347)
Some of the next articles are maybe not open access.

Public-Key Cryptography

2005
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).
  +7 more sources

Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography

IEEE Sensors Letters, 2019
The development of the applications of Internet of Things (IoT) technology continues to grow steadily—one of the top applications being smart home environments.
Shreya Dey, A. Hossain
semanticscholar   +1 more source

Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography

IEEE Transactions on Emerging Topics in Computing, 2023
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto   +4 more
semanticscholar   +1 more source

Public-Key Cryptography

Abstract The basic idea of public-key cryptography as a means for two untrusting parties to establish secure communication is outlined. The use of public-key cryptography to establish a key for a symmetric cryptosystem by using a protocol such as the Diffie-Hellman protocol or quantum key distribution (QKD) is explained. Two major public-
Eric L. F. Roettger, Hugh C. Williams
  +4 more sources

Public Key Cryptography

AT&T Technical Journal, 1994
This article explains public key cryptography, its benefits and limitations.
openaire   +1 more source

A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications

IEEE transactions on intelligent transportation systems (Print), 2022
Basic security requirements such as confidentiality, user authentication and data integrity, are assured by using public-key cryptography (PKC). In particular, public-key signature schemes provide non-repudiation, integrity of transmitted messages and ...
Kyung-Ah Shim
semanticscholar   +1 more source

Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI)

IEEE Communications Surveys and Tutorials, 2022
Public-key infrastructure (PKI) provides the essential foundation for public-key cryptography, and security is often bootstrapped from a PKI. Standardization bodies, organizations, researchers, and experts reached a consensus that deploying Vehicular PKI
Salabat Khan   +5 more
semanticscholar   +1 more source

Public-Key Cryptography

2009
This chapter contains sections titled: Introduction This chapter contains sections titled: Cryptosystems and Cryptanalysis Key Management Digital Signatures and Hash Functions Examples of Public Key Systems and Hash Functions Implementations of Public Key Cryptography A Sample Proposal for a LAN ...
openaire   +2 more sources

Public-Key Cryptography

2003
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For most security properties, it is computational security that has to be considered: an attack scenario describes how adversaries interact with the cryptosystem, trying to attack it; the system can be called secure if adversaries with reasonably bounded ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy