Results 21 to 30 of about 565,557 (301)

Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles

open access: yesIEEE Access, 2019
The fast progression of the Internet of Vehicles (IoV) has resulted in a large number of vehicles connecting to networks. This leads to massive growth in the data collected from vehicles via IoV.
Rashad Elhabob   +3 more
semanticscholar   +1 more source

Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography

open access: yesRice, 2017
— The Lossless data hiding provides the embedding of data in a host image without any loss of data. This research explain a lossless data hiding and image cryptography method based on Choas - Block to image encryption the lossless means if the marked ...
Monika Bartwal, R. Bharti
semanticscholar   +1 more source

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH

open access: yesIET Information Security, 2021
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez   +2 more
doaj   +1 more source

07381 Executive Summary - Cryptography [PDF]

open access: yes, 2008
The topics covered in the seminar spanned most areas of cryptography, in one way or another, both in terms of the types of schemes (public-key cryptography, symmetric cryptography, hash functions and other cryptographic functions, multi-party protocols ...
  +3 more
core   +1 more source

IMPROVING SMART GRID SECURITY USING MERKLE TREES [PDF]

open access: yes, 2014
—Presently nations worldwide are starting to convert their aging electrical power infrastructures into modern, dynamic power grids. Smart Grid offers much in the way of efficiencies and robustness to the electrical power grid, however its heavy reliance ...
Muñoz, Melesio Calderón
core   +2 more sources

Homomorphic signcryption with public plaintext‐result checkability

open access: yesIET Information Security, 2021
Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Shimin Li   +3 more
doaj   +1 more source

A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things

open access: yesIEEE Access, 2019
The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others.
Manisha Malik, M. Dutta, J. Granjal
semanticscholar   +1 more source

Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures

open access: yesIET Information Security, 2021
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi   +2 more
doaj   +1 more source

Towards an efficient LWE‐based fully homomorphic encryption scheme

open access: yesIET Information Security, 2022
The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. These schemes were inefficient in terms of per gate computations and public‐key size.
Uddipana Dowerah   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy