Results 291 to 300 of about 80,803 (302)
Some of the next articles are maybe not open access.
The Mathematics of Public-Key Cryptography
Scientific American, 1979The electronic communications systems that are proliferating throughout modern society offer speed, accuracy and ever diminishing cost. They also present serious problems of security. As the ordinary transactions cond ucted in person, on the telephone or by written co respondence have come increasingly to be conducted by new kinds of electronic systems
openaire +2 more sources
Public-Key Cryptography and Availability
2005When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security guarantees of this technology are based on a particular model of computation.
Tage Stabell-Kulø, Simone Lupetti
openaire +2 more sources
Introduction to Public-Key Cryptography [PDF]
Cryptography was once considered to be a means of maintaining secrecy of communications only in military affairs and diplomacy. However, today, modern cryptography is used for various purposes in familiar circumstances. Public-key cryptography is a key technology of modern society; it is used for personal authentication, electronic commerce on the ...
openaire +1 more source
Arithmetic for Public-Key Cryptography
2009Item does not contain ...
Sakiyama, K., Batina, L.
openaire +2 more sources
Introduction to Public-Key Cryptography
2010Before we learn about the basics of public-key cryptography, let us recall that the term public-key cryptography is used interchangeably with asymmetric cryptography; they both denote exactly the same thing and are used synonymously.
Jan Pelzl, Christof Paar
openaire +2 more sources
Certificates and Public Key Cryptography
2011We concluded the previous chapter by describing the standard way of enabling HTTPS on an Apache web server. Our main goal was to protect the information exchanged between clients and the server from adversaries eavesdropping on communication. In this chapter, we will brush up on public key cryptography and examine its use in more detail.
David Basin+2 more
openaire +2 more sources
Applications to Public Key Cryptography
2016In this chapter we describe, at an elementary level, some of the applications of the Group Theory and Number Theory we have developed so far to Cryptology. We emphasise that these “textbook versions” of the applications do not do justice to the complexities that arise in practice, and warn the reader that implementing the mechanisms that we discuss in ...
openaire +2 more sources
Introduction to Public Key Cryptography
1993We begin with an introduction to private and public key cryptography, and then proceed to introduce elliptic curve cryptosystems.
openaire +2 more sources