Results 291 to 300 of about 80,803 (302)
Some of the next articles are maybe not open access.

The Mathematics of Public-Key Cryptography

Scientific American, 1979
The electronic communications systems that are proliferating throughout modern society offer speed, accuracy and ever diminishing cost. They also present serious problems of security. As the ordinary transactions cond ucted in person, on the telephone or by written co respondence have come increasingly to be conducted by new kinds of electronic systems
openaire   +2 more sources

Public-Key Cryptography and Availability

2005
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security guarantees of this technology are based on a particular model of computation.
Tage Stabell-Kulø, Simone Lupetti
openaire   +2 more sources

Introduction to Public-Key Cryptography [PDF]

open access: possible, 2014
Cryptography was once considered to be a means of maintaining secrecy of communications only in military affairs and diplomacy. However, today, modern cryptography is used for various purposes in familiar circumstances. Public-key cryptography is a key technology of modern society; it is used for personal authentication, electronic commerce on the ...
openaire   +1 more source

Arithmetic for Public-Key Cryptography

2009
Item does not contain ...
Sakiyama, K., Batina, L.
openaire   +2 more sources

Introduction to Public-Key Cryptography

2010
Before we learn about the basics of public-key cryptography, let us recall that the term public-key cryptography is used interchangeably with asymmetric cryptography; they both denote exactly the same thing and are used synonymously.
Jan Pelzl, Christof Paar
openaire   +2 more sources

Certificates and Public Key Cryptography

2011
We concluded the previous chapter by describing the standard way of enabling HTTPS on an Apache web server. Our main goal was to protect the information exchanged between clients and the server from adversaries eavesdropping on communication. In this chapter, we will brush up on public key cryptography and examine its use in more detail.
David Basin   +2 more
openaire   +2 more sources

Applications to Public Key Cryptography

2016
In this chapter we describe, at an elementary level, some of the applications of the Group Theory and Number Theory we have developed so far to Cryptology. We emphasise that these “textbook versions” of the applications do not do justice to the complexities that arise in practice, and warn the reader that implementing the mechanisms that we discuss in ...
openaire   +2 more sources

Introduction to Public Key Cryptography

1993
We begin with an introduction to private and public key cryptography, and then proceed to introduce elliptic curve cryptosystems.
openaire   +2 more sources

Home - About - Disclaimer - Privacy